0000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x110) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) 14:04:58 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRES32]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:58 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7569c7a7a799bf643d3c6426968760dd1c7414da0321865059d89918f717cab567ee29e38401ba1dc71fdea8bf37dd8da654163c1f47dbf6bc66ed05586fa427bbdcd2c33cfa0c0cd04417989801fb581f47840b1e00cb1975e3e456748e2140e3e392a8a7d4270f70087260da211c4da2666d400636e0fd080952b97632346baa0c856eec963e303afc2ee4c45c496272c68319009e02d55034e6569f641f234433e3dca2c5"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "3d2672fad47365969cacd27b220e4992"}, 0x11, 0x1) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000000c0)={0x84, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x1, 'dh\x00', 0x1, 0x7, 0x77}, 0x2c) 14:04:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x0, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:58 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, 0x0, &(0x7f0000000640)) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 166.526535] tmpfs: No value for mount option 'ev/loop#' 14:04:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000040)={0x34}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3100002}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0xa0, r1, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xf39}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4800}, 0x80) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) readlinkat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/213, 0xd5) 14:04:58 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) r0 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="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", 0xfc, 0xfffffffffffffffc) r1 = request_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='%\t\'', 0xfffffffffffffffa) keyctl$instantiate(0xc, r0, &(0x7f0000000300)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x20, 0xff}, 0x83, r1) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x0, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 166.637066] tmpfs: No value for mount option '' 14:04:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') 14:04:58 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000300)=@v2={0x5, 0x3, 0x1, 0x6, 0xcf, "dee995dc93af85b58fb721ba4a7f44bfe28165ccbe9a795b85d6cb5fd1bb2cbb6ce03d7cc4a0ac77f09d8c121fa5b5e980f0c409ac4f9a149f0bab09d95d90fb1154da4c0e8d9b2c8f427cbaf094d09bff0b346dff58e86b2c3a5264c1d8dd385ef2eb01bffc6264bdf71e76a74f6aea2298916190a31af9bbd07387b39ba45fe9ca6be11c3966e2d99632de7f8e0dc288d59afd124c389f2e9b8e44bc4dcc36b24244a1dbee603ca49350c9e2f2df9108e225a2a57cd031793e3854df5b6848889fc7f5401dd4d88f04c3b16465ec"}, 0xd9, 0x2) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "db0c4f2de5acdfae5591f79b70d78753"}, 0x11, 0x2) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:58 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='(user.3]cpuset\x00', r0}, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0x1, 0xc, 0x3, 0x5}) [ 166.683181] tmpfs: No value for mount option 'ev/loop#' [ 166.690430] tmpfs: No value for mount option '' 14:04:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x0, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x2000000, &(0x7f0000000300)='\x7f\xbe\xa4\xa3\x1d\xa1kp;\xf1\vu\x8e6\x9di\x97\xf7\xb2\x948\xca\xf0\xd6\x9a@\x1f\xf4\xa7\xb4h\x85\x96!\x90\xe4)\xfb\x9f\x92\xa9\xc6G\xa4\xb1\xe0\x1e\xa2\x95\xac\xf86\xc7\xec\xaa7\xb3X38\xb3\xcc\xb2\f\xf8D\x96\x96\xa6\x0ekS\x81T\xc7Zr\x93\xbew2\x01\xd0\xdb\x8d\x95!;\xdf\x18R\x8e\x1au\xa3`i{\xbf:\xcf\xf4\xd3v\xe4M\xa5\xd9\x06\x1a\x1b\xd3\r\x9b6J\xb1\xbb\x00\x82\xc47m\xd3>AB\x11>\xcb\xba\x93\xcaB\xf1\x8d\x06Z\x84~\xb1Z\x81)\x05\xe9\xb0\xc4\xc8Ot\x82n\xeb\x91\xd4\x82nf\xbfK\xab\xf6\n1J\xe4\xbbg\x7f\xff\xf2C\xac\xe8[\"H-_9z\x10\xdfis\xe1\aZ\x95\xfb\xb0\xd9\xa5\x8e\xa5s\x9d\x0f=\x8b\xa2D\x92A\xea\xca\xc8\x10\x96\xeaz4\x02\x06\xda*R\xa3\xa5\x19\xabr\xe5\xfas\aZ_d\xe1\x1b\x137\x1e\xa8\xdfq\xf6RB\xbf\x8d\x17m\x03h\x1b3\xa1\xd79\xabo\xba\x15\x10_\xd7\xa1E\xc5&!\xdeB\xfa\x9c*C\xf4\xc6\x96x\xa26\x97l\x0eF\x18\xf9\xa2\xe6;s\x7fm\xf8a\xc2\xdc\xfce/j\x85\x1d\x99n\xdf\xd8o\xff\xb0-\xbc&=g\xcf\xaa\xe2\x80P%=\x7f\xe1\xcc\x9c\xc7\'\x8e\xff\xdd\xc0%\xf7K5') 14:04:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/keycreate\x00', 0x2, 0x0) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x0, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:58 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7569643d7dc1188aed953a2af6cd57d88e0400000082fe148c50fe1b9482d30d8c064346a47ad22fd9e5f424e979e0352d351759057c302e1b6d11e08405e998c323bbd8102bb92ff4811992b7a79719ffd86547603b2532be9afe99137cf9699b3f617eee38edb31f3928ad345d57c514a03e814d4a9e9df24fcc3b61b03f000000848ea32a89e1429ae430ba6e5f57a6b70935d72f8dc842435b377fc1f461fbeaf52f61db0215bd2f44cfd33931278441089d584916f695ac2cd87fea5769932473499b66e2ba10617954dbc0"]) set_tid_address(&(0x7f0000000000)) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = dup2(r0, r0) writev(r0, &(0x7f0000000080), 0x3ac) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='comm\x00', 0x5, 0x3) 14:04:58 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r4 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(r0, &(0x7f0000000180)=""/116, 0x74, 0x40000140, &(0x7f0000000200)=@isdn={0x22, 0x9, 0x3, 0x1, 0x800}, 0x80) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x8000, 0x0) accept4$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c, 0x23a5ea89a5ac435b) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x1c, r3, 0x410, 0x70bd25, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x8000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000280)=0x0) r5 = getpgrp(r4) r6 = syz_open_procfs(r5, &(0x7f0000000040)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r6, &(0x7f0000000080), 0x1a6) [ 166.828817] tmpfs: No value for mount option 'ev/loop#' [ 166.846895] tmpfs: No value for mount option 'kp; u6i8֚@h!)G67X38̲ DkSTZrw2ۍ!;Ru`i{:vM 6J' 14:04:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x0, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:58 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\xd8\x91\xb6\xb1\x1c\x00\b\x98\x00\x16') mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = getegid() r2 = getgid() stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() r5 = getgid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xc) getgroups(0x9, &(0x7f0000000480)=[r1, r2, r3, r4, r5, r6, r7, r8, r9]) writev(r0, &(0x7f0000000080), 0x1a6) [ 166.899873] audit: type=1400 audit(1547388298.833:34): avc: denied { setattr } for pid=6902 comm="syz-executor1" name="comm" dev="proc" ino=19748 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 [ 166.903136] tmpfs: No value for mount option 'kp; u6i8֚@h!)G67X38̲ DkSTZrw2ۍ!;Ru`i{:vM 6J' 14:04:58 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) chroot(&(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/zero\x00', 0x800, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000000)=""/235) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') gettid() ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="11002bbd7000ffdbdf250a0000005000010038000400200001000a004e2100000f5f00000000000000000000ffffac1414bbf9ffffff1400020002004e247f000000000c00020008000100060000000c0002000800010006000000000000000000000000000000000000"], 0x70}, 0x1, 0x0, 0x0, 0x4054}, 0x80) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:58 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, 0x0, 0x0, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 166.989491] tmpfs: No value for mount option 'ev/loop#' 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x0, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/sockstat\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000005400)=""/4096, 0xffffffffffffffb3}) writev(r1, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="ae44b2ce69b90fa45f3504c49d1d6f1c6be326326078055bf3836b9445ac68671008f7477bbcf56a0785cd3113d272761614ab5168efbb4cd40cd41407b1d4751f26e5af645744e3da7e420b84143d1af23295248431d8e94ee7e555f6d72c97db9bfcb56b2b6b9c4c98903c3aa8643771d559299087d8069384586260cc63767451cd813ae0ea1f6fbaefb91699d4d7baacae049c7a53d676077e4ee4064b2c03052cd75e663d924ae38c201d7828c3797bc2861c52390714aba61a0b5eeb1a77e03eb5cc944915fb27ff59b1715776d8edaa2d1f3085ec1c57d185930ae1527443812b462d10ebd9f6ff39236fc1e1ad179965eb28259381748bb45ddef91d406b32f9b47674989b11429f5f598a61dc1c2fb800857992c938ebc9954fac"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:59 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x0, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="ec000000", @ANYRES16=r1, @ANYBLOB="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"], 0xec}, 0x1, 0x0, 0x0, 0x1}, 0x1) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x0) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 167.147895] tmpfs: No value for mount option 'ev/loop#' 14:04:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') getpgid(0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uod=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x0, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$TCSBRKP(r0, 0x5425, 0x2) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x600000, 0x190) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f00000000c0)) 14:04:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 167.243337] tmpfs: No value for mount option 'ev/loop#' 14:04:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='I_\xb2\xee\xf4XK\x9b\x90:\xa3\xc3\xcf8\xa8\x83|\xd6\xc8\xdd\x99\t\xda\xd3Z/k\xd3\x84m!\x89\xe6\x14\xa1\x8cQ\"\x9e\x1f\xce\xbaO\x1e\x8c\x8a\x8d\xce\x7f\x90\xb9\xd3\xe8\xa5\xf0\x10h\x9b\xdbj\xad\xea\t\xca0q&yZ\xb7\x8c\v\xf1wD\xc4\x7fIu\xd7\xda\x1bU\x8a\tF{\xa0\xe5\xfa\xb2\xc8\xda\x10\xfc\xc5$\x84\x9e\xea\xc8\xc5\xc10\xb1%}\xd8\xb0*\x80\x8a\x139f\xf3\xa2\xf4\xb3K\x9c=\xce\xab\xc6G\xcc\x05\xc1\xe7\x17\x11]@\xb4\xc5\xe1\xa6\x147\"\xc7x \xfe&O\xc3a|\x14?\xa5\xa2\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) socket$inet_tcp(0x2, 0x1, 0x0) 14:04:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') writev(r0, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x0, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)=0x0) sched_rr_get_interval(r0, &(0x7f0000000180)) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x7fff, 0x14, 0x2, 0x200040000, "0b7bf4f7164c2557673243b8e1065c49437a7469c2d535643c1f11fe6f96889a"}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r2, &(0x7f0000000080), 0x1a6) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) [ 167.313453] tmpfs: Bad mount option uod [ 167.369456] tmpfs: Bad mount option uod 14:04:59 executing program 3: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x3) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000380)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000340)='./file0\x00', r0, &(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0xffffffffffffffff, &(0x7f0000000200)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40400, 0x0) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) renameat2(r2, &(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x2) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x0, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x1, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x18) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00'}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) getsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 14:04:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x7e}) writev(r0, &(0x7f0000000200), 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/24) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000800)=""/220) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000040)="97243299be0af3bf3f4a9938063262c148a4a929fbea3bd5759755b24562907db285822355ac24aef366a3a622c0e1281b63e397e215998ef9b1858ce0334a0cf3b3b9aee0c6b2303734a17e980aba98f32cf20b881a6ea61b2359304456b9434a1d52e34cdb7a8de5589fda7fc1f3fa", 0x70}, {&(0x7f0000000240)="9820b5aee2295bd897aaaa614a88f846dd8a423645fe2ebf0ab51ef25f97c00b7b1a380a1b5458350a663b53f4b7b480d213bf497f01e1f0292a78f4bd600680776fd099c5d7dc1f45ebb91e1a5e9a4ba505128d9ea74d4b09", 0x59}, {&(0x7f00000002c0)="e5a09f09025f4dc3b619c763488e686e4552002f1f776a7ac3898fe0b68dbad68733e3974ba885da8e3e0f8fa517da06ca6d3c3b103efc350be413bf2e16386cc2ee326d914b3fa63da11599a5c20c226daf3cfdf4c58b25de9944cffe36c138585a4d8e5cf7b0dc8f8278d4c53009d483b56c8581b6b1cfe8ad863c125a", 0x7e}, {&(0x7f0000000340)="e0db59", 0x3}, {&(0x7f0000000400)="618d9ae51eab49c97ce0124ee37f177a92b26b9a6dce081f710fcd5364cd8432d52c55bf699ba0a34591e4825d8f92e677de934ed8b147d42aeb5ec25e397f7ef582e13bfc6ad1fd", 0x48}], 0x5) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000180)=0x8) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000001c0)={'hwsim0\x00', 0xde8}) 14:04:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 167.396986] tmpfs: No value for mount option 'ev/loop#' 14:04:59 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x104) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) umount2(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x0, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) accept4$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x80800) ioctl$TIOCNXCL(r0, 0x540d) 14:04:59 executing program 1: r0 = epoll_create(0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000140)=0x101) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000280)=0x0) capset(&(0x7f00000002c0)={0x20071026, r1}, &(0x7f0000000300)={0x3, 0x8, 0x4, 0x5516, 0x5, 0xffffffffffff0001}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000180)=0x5775) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L-'}, 0x28, 0x2) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r2, &(0x7f0000000080), 0x1a6) epoll_pwait(r2, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], 0x6, 0x7, &(0x7f0000000080)={0x356d}, 0x8) 14:04:59 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) chmod(&(0x7f0000000000)='./file0\x00', 0x8) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x0, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040)=0x77c9, 0x1, 0x4) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000140)="4b2afbec0a92192566613f4a1dcd9df778004b592e975c9aa02d60a6e041ff7417c7e0710f803d3880383515e8d6e32dae281af4e9cef99ba344c119cc031a9ab01cf547061c9cac3740ae505a665c36e628d1331761a256b7c984ff6c41bd41ea11c4f8cbbd87cd3cff822bcf20d9de3ace41e572c715e361467068f522f2f557f2de4183cdd23e6b85eb4f6ac99228535eae753e44a75a8c07916a6446fd5262454ab4915891fb30b331e3fc6baadfce7020c4ecae410333af16dfc4983a74e0c676c6b84fd44870cf3642dac296ce99f18542e937bb20f29ad65edfe1a8ba392d51", 0xe3}, {&(0x7f0000000240)="8cbe554111647f23789bf688cbe07367d2119212ea523e9dfd50a5fb8c88c9d159560313d681668ba2e1d6b28df3e6e9ce18de79ca25011549aa1e4ad7e840fdf2e3a7a6c2300eecff49369c6d9f63a47e62852079688c4471748840c55167a2f8aae078bf", 0x65}, {&(0x7f00000002c0)="f2150fa881c886c10c5167bc4dfa9cedb0d22a0c4e838c4002e807f3e464b689563d93f17ec5e66e600ac2d0a89c40e80dd33de8f9505249e48de71dfb7510a8ce9b44cc15220d3246fda840f9dce06938e357896db3af04a2b45029d9", 0x5d}], 0x3) [ 167.542529] tmpfs: No value for mount option 'ev/loop#' 14:04:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x40000}, 0xc) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="97e9643d"]) r0 = epoll_create1(0x80000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x181000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@loopback, @in=@dev={0xac, 0x14, 0x14, 0x2a}, 0x4e22, 0x800, 0x4e22, 0x8, 0x0, 0x20, 0xa0, 0x6, r2, r3}, {0x101, 0xff, 0x4, 0xfffffffffffffffc, 0x40, 0x100000001, 0x6, 0x4}, {0x101, 0x9, 0x5, 0x5}, 0x8, 0x6e6bba, 0x3, 0x0, 0x2, 0x1}, {{@in6=@local, 0x4d5, 0xff}, 0xa, @in=@broadcast, 0x3503, 0x1, 0x2, 0x2, 0xfffffffffffffffe, 0x7, 0x9}}, 0xe8) ioctl(r0, 0x7ff, &(0x7f0000000000)="6089b8818956dd879ce47ae8c1a80151ee4f65df02d83afb2df3a5cc8dfa0d03bb0eff2e89f834755f34508750e3730084a79224e4374b61acc0633d37d4d0aa4ae7d79550b8515e4873ecda83d935c800d0cdb17d91924e128ed15e17f26849cace5db2e56005e0c45814cccb125743bbad747ad4e39211f1057c6b80b371e4b9ee7f4129cf3a85673e80947bf9d47a4496b914c23e06ab64c0e73d3dffba6a746762a8c07564d8daf23846b8abf9a4ee4652fbf98c74e6bf6e4a65b062d9e0f428980c66d5050af94b") 14:04:59 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20000, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x17, 0x1000, &(0x7f0000000300)="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"}) ioctl$TIOCGPTPEER(r0, 0x5441, 0x40) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x0, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 167.666916] tmpfs: No value for mount option '' 14:04:59 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) pipe2(&(0x7f0000001480)={0xffffffffffffffff}, 0x4800) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000014c0)={0x5, 0x6, 0x81, 0x9, 0x18, 0x7fffffff, 0x8bc, 0x5, 0xa99, 0x5}) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYPTR]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="9f1376604d7fa84fd22864e2aaad41cbce666855c73dddf48050ce42ebd0a7ef96f264910673e6733b56c7ffe81c1f4e9c860b7c79a64027c0349926bddf5ec76ad07a3b77f9fb14a837712ca37569d6fb9d2491eb84b95695957c7ef502fd81cb804f9f94ba0124ec181e893487bd9d5cf71de520a2b1e36fda1c2132444f992718faa1816adc525797751d9f5748a08357b018fc0f2fa6ff69ce", 0x9b}, {&(0x7f0000000300)="cbc3d8f60eafbaba803600fd784182037113fa881c6ad4f2e57d99aeaaffee148ba3a48c27e5f1d58dcce01237fdffe4c7dbc5975c1fcc0a94ad2000cbd3a844a7a7173029a37e279c11a367f60bcc92034ab46cfec5acc21be29b58c2503f1a3b640521a3fe623db4b092f1855a0cc5f49da5f2dc1ebc4efeebbefcba05d1014dbd51d7911070f33eaa486807c188f82a107d93c9d879f507ea86757333c4ab759fd1e12dccd9a5129e08c56478e2f7197e55", 0xb3}], 0x2, 0x4) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001440)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000003c0)=""/4096) open(&(0x7f0000001500)='./file0\x00', 0x80000, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000140)={0x8}, 0x4) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000013c0)=ANY=[@ANYBLOB="6f73782e64650600000066730086a97cc2a170fd9f87ec78b8ce6131342988b57e7f425882b3f51217c0054bc248a30a378a3f50a6b3c9df2e46a55a318de81f9adcd8f4605155ab7ee4dbe814fb06ecd1299cb32926144bace7d78932739b97"], &(0x7f0000000200)='\x00', 0x1, 0x2) 14:04:59 executing program 2: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) setsockopt$inet_mreq(r1, 0x0, 0xa953faffdd66afbc, &(0x7f0000000000)={@local, @local}, 0x8) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x0, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x10800, &(0x7f0000000200)) 14:04:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') fcntl$notify(r0, 0x402, 0x8) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) [ 167.787016] tmpfs: No value for mount option '' 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0x0, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000300)={0x65c, {{0xa, 0x4e21, 0x7, @local, 0x1ff}}, 0x0, 0x1, [{{0xa, 0x4e21, 0x7, @local, 0x4}}]}, 0x110) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v2={0x2000000, [{0x7, 0x5}, {0x234d, 0x3ff}]}, 0x14, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000040)={0x5, 0x8, 0x7}) 14:04:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair(0x1, 0x7, 0x2, &(0x7f0000000100)) mount$bpf(0x0, 0x0, 0x0, 0x200003, &(0x7f0000000200)=ANY=[]) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='\x00', 0x1, 0x2) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'security.', 'devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1'}, &(0x7f00000000c0)='}proc}md5sum\x00', 0xd, 0x0) 14:04:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x89, 0x4) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x0, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x44) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000040)) 14:04:59 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x0, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs_stats_percpu\x00') ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x14, 0x0, "3e3f0b958c5ba0e673b2a6076bc73ae428d276667c1ae8daa3156899c5a6b6fd6e0574638d4524a7e143f8e691722315bcfc58dde21f4be587d1a836c7782b43", "131b3ea9df7e3e569054433ca01f0c28bd8514515b597dd528460eaba3b5ee6d", [0x0, 0x3]}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1f, 0x9, 0x7, 0x7ff, 0x8, r0, 0x9}, 0x2c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r2, &(0x7f0000000080), 0x1a6) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') [ 167.958265] tmpfs: No value for mount option '' 14:04:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(0x0, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:04:59 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) listen(r0, 0x3) r1 = getpgrp(0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='co}m\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r2, &(0x7f0000000080), 0x1a6) 14:04:59 executing program 5: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) rt_sigsuspend(&(0x7f0000000000)={0xffffffff80000001}, 0x8) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:05:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x0, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/fscreate\x00', 0x2, 0x0) dup(r0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x100, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x2, 0x4, 0x73cbb950, 0x1400000000000000, 0xffffffffffff8001, 0x1}) ioctl$TIOCEXCL(r1, 0x540c) socket$nl_route(0x10, 0x3, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:05:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x81, 0x40, 0x0, 0x4, 0x0, 0x9, 0x5000, 0x4, 0x0, 0xffffffffffffff50, 0x40, 0xfffffffffffffe01, 0x200, 0x9, 0x70231c22, 0x9, 0x100, 0x1, 0x3f, 0x0, 0x4, 0x5, 0x1, 0x1, 0x5, 0x520, 0xca, 0x100, 0x5, 0x7, 0x1, 0xfff, 0x10001, 0xf30, 0x1f, 0x3f5, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0xc}, 0x2000, 0xffffffffffffffff, 0x4, 0x0, 0x7fff, 0xa48, 0x8001}, 0xffffffffffffffff, 0xc, 0xffffffffffffff9c, 0xb) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) [ 168.058519] tmpfs: No value for mount option 'ev/loop#' 14:05:00 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0xc65f) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x0, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x0, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) lgetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)=""/36, 0x24) getgroups(0x7, &(0x7f0000000080)=[0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xee00, 0xee01]) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) getegid() getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) keyctl$session_to_parent(0x12) getgroups(0x2, &(0x7f0000000200)=[0xffffffffffffffff, 0x0]) getgroups(0x0, &(0x7f0000000240)) 14:05:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) writev(r0, &(0x7f0000000080), 0x1a6) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080)) 14:05:00 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) [ 168.192012] tmpfs: No value for mount option 'ev/loop#' 14:05:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) chroot(&(0x7f0000000000)='./file0\x00') 14:05:00 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x0, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x100, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xe9, 0x4, 0xfffffffffffffff9, "99559bbe415833d21c22cb17a5dc2e81", "652d990f0e472a39de30ae585e167e831b4dde42ceb315612220092400feab5586ce92201daf0741cd03490fcd333ae569d709e7670bdb5fe937aa753aeedb99f757117495364c54d54c6f3ec3c7f001bdc3159fedeb6b63ced59967548c3799c42d9881f980880b15c64ce4907cd1ca7985b55b96faed13e1c2322a6481722d152f4d9c7b038d3089cde704bed36e0e77e08f02977e30f90cafe8b6f263a5e7fbf127d1422def1355cc6d59898ec8af8dee63bc6c6adfd6bba1f1936b6b0392b4bf2b70180315130d8e5e35ee2535a81f8ebaa9"}, 0xe9, 0x3) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={0x0, @local, @empty}, &(0x7f0000000240)=0xc) recvfrom(r1, &(0x7f0000000140)=""/153, 0x99, 0x40002000, &(0x7f0000000280)=@ll={0x11, 0x16, r2, 0x1, 0x88, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x80) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000040)=0x2000000010, 0x9a18fc765895004e) write(r1, &(0x7f0000000080)="2400000024007f01000000000000ffffffff010002000000000000000000000000000000", 0x24) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x0, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x10000000000003ac) 14:05:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x0, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 168.927972] tmpfs: No value for mount option 'ev/loop#' 14:05:00 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESOCT, @ANYBLOB="09a7f19d8d5cd27fb9d29c337c1432a9166c4de736f68d2606df5a419bf5a6eeada822cb5cb65e3c915413159b67691eb7bc24736b2e"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:05:00 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x0, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x3f, @empty, 0x3}, 0x1c) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) 14:05:00 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) 14:05:00 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x0, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:01 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x6) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000440)={@dev, @initdev, 0x0}, &(0x7f0000000480)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f0000000580)={&(0x7f0000000780)=ANY=[@ANYBLOB="6c0000001c0000e66fa26ad3042cbd7000ff5bdf2507000000fc3dedcf0591fac1d586d7dc5521c27c7da18a6c380eb17e9b4d00383c82f487ab28b716ef14d736f3c06f5a8effa44b77294c27908ca13751d4fe2304276490da859501de60bfd32d3d914457aae7c9744da7536e9b3bf20fbef594452a8323", @ANYRES32=r2, @ANYBLOB="9400040708000b00ff0100000800090007000000080007008bd9000008000100e0000002140001000000000000000000000000000000000008000800efd3b270a6085e5f7bfa0919280b75dfafbc6db705fc57e991d96e46472752818621cc218c437b80d690c3bad0d33de7c46d4f51124a514706b949492e0cbd42b16ce376665b68bef6e9ab3d45c0959b0db3a7e716b6d78b8c4427e2735c1a2a56cd07ea8039a73d56c4e7cc4ceaf61c8abc0b198534b29555e3d44bad034cf0d23a893f95b5f493ed5fe524fc350b8c8e89957b3fc14d549a70e4743c434d9d441936e7c20f", @ANYRES32=r3, @ANYBLOB="0c0001000180c200000100000800040007000000"], 0x6c}, 0x1, 0x0, 0x0, 0x20000010}, 0x10) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) accept4(r0, &(0x7f0000000000)=@nl, &(0x7f0000000080)=0x80, 0x800) creat(&(0x7f00000000c0)='./file0\x00', 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)='trusted\x00'}, 0x30) r5 = syz_open_procfs(r4, &(0x7f0000000300)='ne\xa1\xbaO\xcb\xe7(\xdft/igmp6\x00}\"\x176\xc5&Im\x9f?Z@hxs\xf0B\xe1\xa9U\x91\xefF\b\x96\xa5\x83\xc4 \xd1\x7f]\xbc\xc6_;\xc3\xc2\xe7\xa9\xd4\xf9;!\x9a\x94\x0eNt\xd0\xad+-\x00\b\x00\x00\xc7\xc3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r5, &(0x7f0000000080), 0x1a6) 14:05:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x4e22, @local}, {0x306, @dev={[], 0x22}}, 0x2, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'veth0_to_bond\x00'}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100), 0x4000) 14:05:01 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) 14:05:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x0, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:01 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x0, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 169.117634] tmpfs: No value for mount option 'ev/loop#' 14:05:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) 14:05:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r1 = getpgid(0x0) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xc9}) writev(r0, &(0x7f0000000080), 0x1a6) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000140)=@v2={0x5, 0x3, 0x6, 0x100000000, 0xe0, "5003a2cd52b842905742c74edaf71f2b3f6f8438b09a0cb83e60ff9256dc179a8dd6a0143acd5327a59354762f65d2cf38ba0858102b0dc822b87513e3528a23111c5bed7288bebe64caac3b371ae325c5fdd328766beda67360e5b4d48328d44d67e42e4a2cb7231f2fe5e7642f814d03bb215a7fb98b125cd9f78871df03384ddf3e1fd5adb2ef4c3ee61d4c4d9cd076b012e85518a46fd90d26aef822ddcefe6734d38342257fd26c5035bb7fd7109ee1a0edaa69e679d6cbd9452fe2011e9ace2ad3ad228b6db7b614d15eec7dcb325f05fee32c0d2217ab91a76e42a5f3"}, 0xea, 0x2) 14:05:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x0, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:01 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000840)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/118, 0x76}, {&(0x7f0000000300)=""/253, 0xfd}, {&(0x7f0000000100)=""/90, 0x5a}, {&(0x7f0000000400)=""/236, 0xec}], 0x4, &(0x7f0000000500)=""/181, 0xb5}, 0x2}, {{&(0x7f00000005c0)=@alg, 0x80, &(0x7f0000000780)=[{&(0x7f0000000640)=""/190, 0xbe}, {&(0x7f0000000700)=""/66, 0x42}], 0x2, &(0x7f00000007c0)=""/68, 0x44}, 0x2}], 0x2, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000008c0)=0x4, 0x4) 14:05:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) 14:05:01 executing program 1: r0 = socket$inet6(0xa, 0x4, 0x400) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=""/96) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x2, @empty, 0x4}, 0x1c) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000080)='com-\x12\x8e\x7fV{HI\x9b!\xd9\x9f6\x1a>pl^u\"%\xce\xb1\x04\x00\x00\x00\x00\x1f\xd2\xaf\xfd\xd8\xc4H\x15VC 2\xf0v\xa0X\x1d-\x11\xd2U\xd3\xb4\xac\xec\x7f\xf0\xda') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) prctl$PR_SET_KEEPCAPS(0x8, 0x0) writev(r2, &(0x7f0000000080), 0x1a6) 14:05:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@local, @in6=@ipv4={[], [], @initdev}}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@initdev, @in=@initdev}}, {{@in=@remote}}}, &(0x7f0000000000)=0xe8) [ 169.250560] tmpfs: No value for mount option 'ev/loop#' 14:05:01 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x0, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x0, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:01 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000001980)={&(0x7f00000007c0), 0x80, &(0x7f0000001900)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/92, 0x5c}], 0x2, &(0x7f0000001940)=""/4, 0x4}, 0x40000020) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000840)='rdma.current\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', &(0x7f0000000100)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1'], &(0x7f0000000740)=[&(0x7f0000000300)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', &(0x7f0000000380)='@ppp0\x00', &(0x7f00000003c0)='em0\\self\x00', &(0x7f0000000400)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', &(0x7f0000000480)='\').\x00', &(0x7f00000004c0)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', &(0x7f0000000540)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', &(0x7f00000005c0)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', &(0x7f0000000640)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', &(0x7f00000006c0)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1'], 0x0) 14:05:01 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000040)='comm\x00'}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000280)='\xd0\xc4PP\xf4\x15\xb8\x17\x14\xbc\xe2\xf2\x9e\xf4_D\xbe\x83\xe4\x82\xec\x1af/\xa1B\x05\xc0\x7f\xde\x84c\'\xd5{{\xcfRu\xa1\x1bj\x1f\xae_\xcd\"\f\xe6X=\xe0\x90\xe8\xa4\xf7\t7\xdaD\x10\xb8j\xb7NM\xe6\x01|H\xe1\x11\xa1[m\xf7\xa1\xf9UI:\x80]\xca]\xfb\x87P\x1d\x92h\xcc\x9e\xe1\x7fn\xc3>\xfb\x95p\aP\xa60x]\xc1\xbc\xdfzU\xf1\xb5\x93\xbb\x96\xf8q\xdca1\xf7\xb6\x10\xfc\x85') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) write$P9_RCLUNK(r1, &(0x7f00000000c0)={0x7, 0x79, 0x2}, 0x7) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:01 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)='^\x00'}, 0x30) ptrace$getregset(0x4204, r0, 0x200, &(0x7f0000000080)={&(0x7f0000000140)=""/246, 0xf6}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r2 = fcntl$dupfd(r1, 0x406, r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0x140, r3, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}]}, @TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe110}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x140}, 0x1, 0x0, 0x0, 0x10}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080), 0x1a6) 14:05:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x0, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 169.393104] tmpfs: No value for mount option 'ev/loop#' 14:05:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:01 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x0, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=""/126, 0x7e}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r1, 0x1, 0x18}, 0xc) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0)={0x3f, 0x4e, 0x21, 0x9, 0x1, 0x8, 0x89cb, 0x3b000}, &(0x7f0000000200)={0x9, 0x7, 0x81, 0x5, 0xf, 0x1, 0x2, 0x200}, &(0x7f0000000240)={0x1, 0x3, 0x3, 0x6, 0x1, 0x1, 0x1, 0x8000}, &(0x7f00000002c0)={r2, r3+30000000}, &(0x7f0000000340)={&(0x7f0000000300)={0x80000000}, 0x8}) writev(r0, &(0x7f0000000040), 0x0) 14:05:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x0, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ppoll(&(0x7f0000000040)=[{r0, 0x1004}, {r0, 0x8500}, {r0, 0x20}, {r0, 0x1000}, {r0, 0x4400}], 0x5, &(0x7f0000000080)={0x77359400}, &(0x7f0000000140)={0x5}, 0x8) writev(r0, &(0x7f0000000080), 0x1a6) openat$cgroup_ro(r0, &(0x7f0000000180)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001540)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x201880}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=@deltclass={0x111c, 0x29, 0x20, 0x70bd2c, 0x25dfdbfd, {0x0, r1, {0xfff3, 0xf}, {0xfff2, 0xd}, {0xffff, 0xb}}, [@TCA_RATE={0x8, 0x5, {0x24d0, 0x2}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x1050, 0x2, [@TCA_HTB_RATE64={0xc, 0x6, 0xe8e}, @TCA_HTB_CEIL64={0xc, 0x7, 0x7fffffff}, @TCA_HTB_CEIL64={0xc, 0x7, 0xffffffff00000001}, @TCA_HTB_RATE64={0xc, 0x6, 0x6a}, @TCA_HTB_RTAB={0x404, 0x4, [0x8d8, 0x80000001, 0x7fffffff, 0x35, 0x9, 0xffffffff, 0x9, 0x3, 0x1, 0x751, 0x8, 0x5, 0x8, 0x5, 0x2, 0xd7b, 0x80, 0x5, 0x6, 0x6, 0x8, 0x4, 0x100, 0x2, 0x3, 0x5, 0x9, 0x8, 0x4, 0x3f38, 0x81, 0x0, 0x5, 0xff, 0x0, 0x4, 0x1, 0x7fffffff, 0x3f, 0xa37, 0x5, 0x80000000, 0x8, 0x20, 0x2, 0xe4ef, 0x6, 0x4, 0x7fffffff, 0x7ff, 0x8000, 0x561, 0x1, 0x5, 0xdb, 0x3, 0x8f, 0x80000001, 0xffffffff, 0x4, 0x6, 0x6, 0x1, 0x0, 0x3, 0x4, 0x4, 0x1, 0xac, 0x1ef, 0x10001, 0x7, 0x7, 0x2a, 0x3, 0x200, 0xfb, 0x5, 0x0, 0x7, 0x7, 0x5, 0xfffffffffffff800, 0x1f, 0xffff, 0x3, 0x9, 0x3, 0x7fff, 0x200, 0x4, 0x6, 0x2, 0x2, 0xe78, 0xffffffffffff5caf, 0x4, 0x3, 0x81, 0x1, 0x0, 0xfff, 0x4, 0x0, 0x8, 0x3, 0xb3, 0x5, 0x5, 0x0, 0x3, 0x7, 0x100000001, 0x7, 0x0, 0x9, 0x2, 0x8, 0x6, 0x4, 0x34, 0x0, 0x4, 0x17, 0x0, 0xefba, 0x63f, 0x5, 0x0, 0x20, 0x200, 0xfffffffffffffffc, 0x1, 0x5, 0x10000, 0xffffffffffff8000, 0x0, 0x0, 0x10000, 0x1, 0x1, 0x548, 0x8, 0x100, 0x9f4, 0xba7, 0xb8, 0x8, 0x13a, 0x8, 0x6e, 0x10000, 0x8, 0x1, 0x3a1, 0x7, 0x62, 0x2, 0x4eab221b, 0x3, 0x200, 0x2, 0x5, 0x1, 0x6, 0x3, 0x5a, 0xffffffffffff9bd2, 0x2, 0x9, 0x0, 0x7f, 0x4, 0x2, 0x100000000, 0x0, 0x10001, 0x400, 0x2, 0x9, 0x40, 0xffffffff, 0x23cf, 0x100000000, 0x2, 0x8, 0x9, 0x1a8, 0x23, 0x1, 0x1, 0x2, 0xffffffffe30d4689, 0x20, 0x5, 0x5, 0x81, 0x4, 0x8001, 0x3, 0x3, 0x2, 0x6, 0x9, 0x2, 0x6, 0x2, 0x800, 0x3ff, 0x2, 0x7, 0x8, 0xfffffffffffffffd, 0x2, 0x2, 0x100000001, 0x4, 0x6, 0xb60a, 0x8, 0x9, 0x5, 0x7f, 0x8, 0x39cb3d3b, 0x3, 0x80, 0x100000000, 0x7ff, 0x3, 0x3, 0x1db4, 0x7, 0x0, 0x3, 0x1, 0xffffffffffff3a0a, 0x7, 0x7fffffff, 0x1cc, 0xfffffffffffff6c3, 0x1, 0x7, 0x4, 0x9d9, 0x40000000, 0x6, 0x4, 0x7, 0x8e, 0x6, 0x800, 0x32, 0x9, 0x401, 0x5]}, @TCA_HTB_RTAB={0x404, 0x4, [0x5, 0x0, 0x8, 0xa91, 0x0, 0xfa26, 0x401, 0x1, 0x41e0, 0xcde, 0x6, 0x7, 0x80000000, 0x1aca8000000, 0x4, 0x0, 0x1, 0x10001, 0x800000000000, 0x2, 0x5, 0x7fff, 0x5, 0xfffffffffffffff8, 0x4, 0x3, 0x4, 0xff, 0x0, 0xbbd5, 0x9, 0x40, 0xfb2, 0x8, 0x8, 0x8, 0x7fffffff, 0x1, 0x441, 0x1, 0x7, 0x4, 0x5, 0x5, 0x7, 0x200, 0xff, 0x3, 0x9, 0x401, 0x5, 0xb57, 0x3f, 0x2, 0x80000001, 0x8, 0x4, 0x8, 0x1ff, 0x5, 0xfffffffffffff001, 0x9, 0x0, 0x3, 0x5, 0x8, 0x4, 0x1ff, 0xfff, 0xa6d, 0x1f, 0x5, 0x9, 0xfffffffffffffff7, 0x2, 0x40, 0x8000, 0x7a88, 0xee, 0x6, 0x2, 0x3ff, 0x0, 0x14839d73, 0x9, 0x0, 0x8, 0xb8a, 0x7, 0x1, 0x7f, 0x5, 0x5f6, 0x3, 0x8, 0xd89, 0x3b000000000, 0x0, 0x1ff, 0x8, 0x701e, 0x1, 0x80000000, 0x5, 0x4, 0x7, 0x86, 0x6d, 0xca5, 0x3, 0x9aa, 0x2, 0x6ec, 0x1000, 0x8, 0x5d, 0x0, 0x175, 0x4, 0x56, 0xd, 0x7, 0x4, 0x800, 0x0, 0x6, 0x4f, 0x100000000, 0x6, 0x3, 0x1ff, 0xffffffffffff0000, 0x2, 0x6, 0x5, 0x6, 0x5, 0x7ff, 0x0, 0x0, 0x8, 0x5d95, 0x6, 0x9, 0x3, 0x80000001, 0x6, 0x8, 0x0, 0xffffffffffff0001, 0xffff, 0x1b3, 0x1, 0x6, 0xfffffffffffffffc, 0x6, 0x4, 0x6da3, 0xadf9, 0x3, 0x4, 0x1a5, 0xa55, 0x0, 0x9, 0x4, 0x6, 0xedf6, 0x3, 0xfffffffffffffffb, 0x0, 0x3, 0x2, 0x94, 0xf5, 0xf50f, 0x2, 0x100, 0x0, 0xfffffffffffffffe, 0x8, 0x8, 0x40, 0xe860, 0x80000001, 0x1f1a, 0x2, 0xfffffffffffffff7, 0x0, 0x6, 0x55f, 0x1ae, 0x1d, 0x9, 0x6, 0x4, 0xa4, 0x1, 0x3d4c, 0x3, 0x2, 0xffffffff, 0x100000000, 0x0, 0x6, 0x40, 0x7, 0x8, 0x9, 0x3, 0x40, 0x0, 0xfffffffffffff000, 0x9, 0x7, 0x5, 0x1f, 0xffffffff, 0xffffffffffffff81, 0x3, 0x20000000000, 0x1, 0x10001, 0x7, 0x1f, 0x4, 0xe742, 0x0, 0x58, 0x7fff, 0x2, 0x7, 0x1, 0x3, 0x7fffffff, 0xd2, 0xeb, 0xffffffffffffffff, 0xfffffffffffffffe, 0x10000, 0x8, 0x2, 0x10000, 0x5, 0x2, 0x5, 0x3, 0x9, 0x2, 0x1, 0x1, 0x2, 0x7, 0x0, 0x7fff, 0xfff4]}, @TCA_HTB_CEIL64={0xc, 0x7, 0x1f}, @TCA_HTB_CTAB={0x404, 0x3, [0x72e9, 0x5, 0x400, 0x3, 0x96, 0xdc, 0x2, 0x4, 0xfffffffc00000000, 0x9, 0x7, 0x0, 0x58, 0x8001, 0x3, 0x41, 0x100000000, 0x8, 0x4, 0x4, 0x2, 0x7, 0x80000001, 0x4be, 0x1, 0x10001, 0x0, 0x3, 0x8548, 0x7, 0x3f, 0x4, 0x4, 0x0, 0x0, 0xfffffffffffff70e, 0x5, 0x800, 0x7, 0x4, 0x1, 0x1, 0x4, 0x7e00000000, 0x26, 0x7, 0x800, 0x5, 0x7, 0x100000000, 0x0, 0xffffffff, 0xffffffffffffffff, 0x3, 0x1f, 0x10000, 0x7, 0x4, 0x480000000000000, 0xad35, 0xfffffffffffffff8, 0x4, 0x2, 0x6, 0x2, 0xffffffffffffffe1, 0x1, 0x1, 0x8001, 0x20, 0x7, 0x34, 0xbcdf, 0x5d6aad1a, 0x1, 0x4, 0x7f, 0x4, 0xffff, 0x0, 0xe4, 0x8, 0x5, 0x401, 0x401, 0x1f, 0x2, 0xb0, 0x30e9, 0xc3, 0x1, 0x257, 0xdb, 0x9, 0x9000, 0xfffffffffffffffa, 0x6, 0x3, 0x80000001, 0x3, 0x0, 0xffffffff, 0x3, 0x0, 0x4, 0x7, 0x1, 0x8a2, 0x1f, 0xaa2, 0x4, 0x8, 0xd5, 0xa80000000000, 0x1f, 0x0, 0x100000000, 0x6, 0x3, 0x0, 0x7, 0x5d, 0x3, 0x20, 0x5a7, 0x0, 0x8, 0x2, 0x80000000, 0x6, 0x1, 0x7, 0x6, 0x9b, 0x5, 0x10001, 0x80000001, 0x7ff, 0x800000000000, 0x401, 0x1f, 0x1, 0x3, 0x104, 0x200, 0x8, 0x400, 0x9, 0x6, 0x6, 0x10001, 0x4, 0xfffffffffffffff8, 0xd5, 0x80000000, 0x1, 0xc5, 0x8, 0xffffffffffffffff, 0x8, 0x800, 0xea, 0x9, 0x9, 0x7, 0xfff, 0xa1, 0x1000, 0x24e9, 0x0, 0x1, 0x8, 0x5, 0x1, 0x10001, 0x5, 0x2213a8e4, 0xff, 0x100, 0x7, 0x5, 0x400000000, 0x3, 0x1, 0xfffffffffffffff9, 0x8e7, 0xfffffffffffffffd, 0x0, 0x4, 0x2, 0x7fffffff, 0x7, 0x7fff, 0x5, 0x4, 0x5, 0x9, 0x0, 0x400, 0x8000, 0xfffffffffffffff8, 0x1, 0x8, 0x5, 0x5, 0x1, 0x4, 0xffffffff, 0x5, 0x200, 0x100000000, 0x80, 0x101, 0x0, 0x73, 0x9, 0x1ff, 0x7, 0x3, 0x2cfe, 0xfffffffffffffffc, 0x0, 0x6e97457d, 0x4, 0x200, 0x64, 0x80000000, 0x4, 0x20, 0x1, 0x4, 0x0, 0x5, 0x122, 0x8, 0x1, 0x4, 0x3, 0xa94, 0x0, 0x3, 0x8000000000000, 0x0, 0x2, 0x40, 0xfffffffffffeffff, 0x0, 0x7, 0x7fffffff, 0xfffffffffffffffc, 0x8000, 0x7, 0x20, 0x1, 0xffffffff80000001, 0x80000000]}, @TCA_HTB_CTAB={0x404, 0x3, [0x7, 0x4, 0x3, 0x1, 0x70d, 0x2, 0x1ff, 0x6, 0xfffffffffffffffa, 0x3, 0x3, 0xfffffffffffffff9, 0xd, 0x83, 0x8, 0x8, 0x8, 0x9c, 0x5, 0x101, 0x6, 0x8, 0x8b7b, 0x8, 0x0, 0xe68, 0x7a, 0x2, 0x0, 0x9, 0x0, 0x1000, 0x5, 0x80000001, 0x8, 0x141a, 0x7, 0x7, 0x8, 0x5, 0x6, 0xfff, 0x80000000, 0x1, 0x8, 0x1, 0x70, 0x0, 0x2, 0x3, 0x0, 0x1, 0xf4a0, 0x7, 0x9, 0x8000, 0x4, 0x8, 0x3, 0x9, 0x8, 0x6, 0x1000, 0x6, 0x1, 0xff, 0x8000, 0x6, 0x9, 0x6, 0x7, 0x10001, 0x7f44, 0x2, 0x5, 0x0, 0x10000000000, 0xff, 0x8001, 0x1000, 0x0, 0x8001, 0x8, 0xf61, 0x3, 0x3, 0x3, 0x5, 0x7fff, 0x8, 0x0, 0x4, 0x9, 0xc0a1, 0x100000001, 0x80, 0x4, 0x3, 0x6, 0x6, 0x6, 0x3, 0x5, 0x200, 0x1, 0x1, 0x9, 0x3, 0x6, 0x2000000000000, 0x1, 0x2, 0x420, 0xffffffffffffffe3, 0x1, 0xb4a, 0x0, 0x4, 0x43d2, 0x3, 0x2, 0x8001, 0x81, 0x9, 0x2, 0xe6, 0x7, 0x7ff, 0x7, 0xd21, 0x2000, 0x8e0, 0xa7, 0x5, 0xffff, 0x200, 0x3, 0x7, 0x1, 0x7, 0x6, 0x7, 0x3ff, 0x6, 0x7, 0x101, 0x9441, 0x9, 0x4, 0x80000001, 0x3, 0x3, 0xffffffff, 0x49, 0x1, 0x2, 0xffff, 0x9, 0x10001, 0xfff, 0x7ff, 0x9, 0x9f7e, 0x2, 0x22, 0xfff, 0x6, 0x0, 0xffffffff80000001, 0x100000001, 0x6, 0x4, 0x8001, 0x4, 0x7ff, 0xd0d5, 0x8, 0x0, 0x8000, 0x8, 0x81, 0xeba0, 0x7f, 0x5, 0xf5, 0x3, 0x6, 0x1, 0x3ff, 0x923, 0x4, 0x40300000, 0x0, 0xee1, 0x3, 0x8, 0x0, 0x101, 0x3a, 0x1, 0x401, 0x1, 0xaeb8, 0x401, 0xff, 0x0, 0x7, 0x101, 0x8, 0x1, 0x200, 0x4, 0x0, 0x7fff, 0x3d5, 0x10000, 0x3, 0x4, 0x1, 0x35a0, 0x2, 0x1, 0xffffffff, 0x5, 0x7d, 0xd, 0x8001, 0x5, 0x9, 0x5, 0xaf65, 0x1, 0x4, 0x5, 0x1, 0x8, 0x48f3, 0x1, 0x8, 0x8, 0x6, 0x4, 0x99, 0x1, 0x3, 0x8, 0x5, 0x7, 0x0, 0x4, 0x700000000, 0x1, 0xa4d, 0x9, 0x3, 0xfffffffffffffffb]}]}}, @tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x84, 0x2, [@TCA_HFSC_RSC={0x10, 0x1, {0x101, 0x902, 0x9}}, @TCA_HFSC_USC={0x10, 0x3, {0x8, 0x1f, 0x2}}, @TCA_HFSC_USC={0x10, 0x3, {0x67380, 0x9ab, 0x5}}, @TCA_HFSC_USC={0x10, 0x3, {0x8000, 0x9, 0x4}}, @TCA_HFSC_FSC={0x10, 0x2, {0x2, 0xe9, 0xff}}, @TCA_HFSC_RSC={0x10, 0x1, {0x9, 0x2, 0x9}}, @TCA_HFSC_FSC={0x10, 0x2, {0x2000000000000, 0xe491, 0x1}}, @TCA_HFSC_USC={0x10, 0x3, {0x0, 0x101, 0x2}}]}}, @TCA_RATE={0x8, 0x5, {0xffffffffffff2b1d, 0x8}}]}, 0x111c}}, 0x4) 14:05:01 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0x0, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 169.501048] tmpfs: No value for mount option 'rdma.current' 14:05:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 169.613538] tmpfs: No value for mount option 'ev/loop#' 14:05:02 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='uid=']) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000140)=0xe8) getgroups(0x7, &(0x7f00000001c0)=[0xee00, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee00]) lchown(&(0x7f0000000000)='./file0\x00', r0, r1) 14:05:02 executing program 2: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x80) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r3, 0x7fd, 0x30bd2b, 0x25dfdc01}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x20004000) 14:05:02 executing program 1: gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) 14:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:02 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x0, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80800}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x6c, r2, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x778}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9a4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x981}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x200}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4873}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x90}, 0x40000) r3 = syz_open_procfs(r0, &(0x7f0000000080)='net/sctp\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r3, &(0x7f0000000080), 0x1a6) 14:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x0, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 170.280486] tmpfs: No value for mount option 'rdma.current' [ 170.313375] tmpfs: No value for mount option 'ev/loop#' 14:05:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:02 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) r3 = syz_open_procfs(r0, &(0x7f00000001c0)='net/psched\x00') ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000200)={{0x0, 0x9, 0x2, 0x4}, 'syz1\x00', 0xf}) r4 = syz_open_procfs(r1, &(0x7f0000000080)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r4, 0x0, 0x3, &(0x7f00000000c0)='/,\x00', r2}, 0x30) writev(r4, &(0x7f0000000080), 0x1a6) 14:05:02 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x0, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x3, "65562b9989234429"}) ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000240)={&(0x7f0000000280)=""/126, 0x2cf}) writev(r0, &(0x7f0000000080), 0x1a6) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/220, 0xdc}, {&(0x7f0000000400)=""/157, 0x9d}], 0x2, 0x0) 14:05:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000000), 0x0) writev(r0, &(0x7f0000000080), 0x1a6) [ 170.459714] tmpfs: No value for mount option 'ev/loop#' 14:05:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r0, r0, 0x7, 0x2}, 0x10) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) faccessat(r0, &(0x7f0000000200)='./file0\x00', 0x7, 0x1000) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000240), 0x4) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x14) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="2af41fbfb2d764572b630c8e5fb045dbbdc491ea0c9fe38e7b5e30db7a2931d021b4f995c3", 0x25}, {&(0x7f0000000140)="ebce51d9c4f51e43a44e1df7a1705ede97679a26dfff05194fe30c4e6fe7fae14bf9f42f655f474fe5346ffc8b17a552c5744ffde3d98096e5e6783410534d096435887dbf98e18c850c14ebeb6ba7ae8e42357fa6c950a9450434721cba7488e477d976c48d251909b6", 0x6a}, {&(0x7f0000000400)="bb41c2ae6fb23416fddc8bb115830ef53e05f1c3152705415dd42ab6a8eef50c283d6533ba01fad9280cd4f68eaea43bed99ba5a925d2c94e3efd91d9f899ba39dd3fbdab6dec0cb1ada0561ba2fe4a8897e0683179b30552f59d65896fc2deb73767f514b8c2680e1c49356342b9b3e4518ee45a59aead77904e092e6e85247877a5592460608db82476e93208778137d7b5fe775824c5e41c214dad4580b6ca013568baab49f8fe592486b77dbbab975152ff9fac19b09ebe81b8c3a6db7c18b039e8de23860ab1436f6b158d13bf70be4c289056d623dd582290851b93b1e1da32af50d16715b49edf840ae535235d2c5226eb7dbc08cfc1eb9e230420ce5e5139715d102045d949c3371c791a3faeb2aa409a4fdfa17304a020b00ea4acf63ee6e49796027b10d588e5f9b6a83067d7a0176d5acb8e70901b1b358eae571b3b4d7df8ba1e7bb2f356113c9812eb7fee59d0923bcc6511b8ed22367900b664413910fed2e5ab841a23885856c520409603b52ae136ef64113d88a9cba91f269dfa21289cea4c638a6a040671ef2f0efaf23bd9e22dfe278ef2846aa845ab15baf63b65d4a143e917939b4884a42115b874161a5a55bef9d241396d5807927ebb2d80caf3146f3e211130facfa1f8f26e22f019a709711f0f0f3ba4242dedadb9a6020b9e0e78b6ea6a4de01e67ce1a6878ef846e7da667a8d91475da6f4c394b05d8a09ddbbc091156e9def7fb1f4dfc75e9109016863a4e48168e1c41dba9f3eef1859a1e0d498c72fe98435fb9e1c6c52a4d2f620bf9399dd9b738655efae2c0944ab55528138b246b5e7cb07a0e63c984eb9016575e0483e172d7f90e9f8c0930cbb58d2c32da73fe7a676864a6b36d6a736f26fb88d6c59e0737a787a416f93f653a8ec9602150a673940f57f8b2439346fb66388b512c43fc902c290c4eb8ada9b5fedf9bd7d50e2768e2ce43061327b528e9f449768d1cfb1b535b588dad88deecb253db3317a47c271bfbe40daf77ea79a08bff8c3a3f9f8ff41a6097b757508a34b1a595e841342bb565c563b82d5a2053f294e838078360c531df4fd1338ade576bff9c2f90822185f6ad8c4aa584ba5e7a6a8aca2a80aa7413df87d5541c96aac7d9a9a95d93a1cbc299f61c8f585bcdfb657c2cf81a2bf531841476160ba445269ad8bda8ceec5bc28b4d09ac11f6ce14e9ff29577f8f4b0edb47d516a50bd5efa1114ba06a9d07a7c149dca3809b66f030d30b340d2f145e939da804f075da47c101ccbf54af781f6f543e569a20b90f597b4c963511fb2a9336204c4d6577293be16268ec1f8b9c07561f5ad9762b1098890a0b87382f570f7c2701fa9ac46e1e6d0ed573c03b93f16c32d87a05dc166508bbb17015363299ee2ec814c4c60416698030a18ebef31552d381497e786c40981a52f979c6cb10bbaf1df1fb744d1a3883808c3791eaea5365fb8dd09d514e40c59ce899b3f4b1cb1d159899198cab7bcbc4ea229366720277fefb1617b9c6d8d55d81c18f797c4ff8281d66d484e5cfba0d1681fa1faa0cf3fa84795abccf63ed23732e38951d8125aa49edb2d73640d8f84f6aae990b4130e5b6bb92103de927c9ccac78b19bb03b624d9ea8a07ca3d193775cd8f62568c7e5246271d3716eeb73e7ca0e63022fe8891bef48dc9a8de6ab02e59c098e5ccb0bdc53ccc52dbfd2e530e52e1b180096eb0066925dfb1c778472efacd60a6cd69a7111964d44d40b161d2b57efbaea9ba802f8df3c47c5bf3f558f7d2ee4dd7175b38b0d416532ad8cd0cda7bb41de008d47385e143415a631cbec4819c133d35436dbffbdc397458e9bdf92ea6897ec34e84034688455f541b40485a7f25142f78f49151918d5ab5b44de4cf40e2959c8792fd7cd4fbf2a1979372754dd346d52487169696d1dc74d7debb3d96f7b308ec8ebe54a58ff047f54f924e6215836aa6498681d61f06b6992b37e7e10e0954d8c51736bb9e736cb7b886f02a7b83f93ce0b9a0e1ca99bfbcf7c9e6d0a9b7ed38979890cbc2f07aa60438c89b01bdbfa8fda0422cbc3d5562a5df4674163636017b2436dd679603d82488cef54f4b417867756c330f64084a3873e3063b271d7005b59575f01835fc5853ab733e94135c8cc0838b7845bf45150aa00651529cedb2aa43932d7ab999c5c59af116128e9f36248e69d4e213d79eb335785e845cdef0b4a0e2ac27cc94ec7738446ab60564ab456996140176566fa371f86212967cc454d2b8299165cda03d16256e1ba9346f18c18655a1213934ff248007c426f5dccce7391e09e53750fc69e2cc576ce6f563d339b1e8bed0918fdd6a14e6dcf438e2503992db5459c3629f08088df8053940b4a449f44c88d0b01db52afd05cfa92807fddc6a6a27db98c387a0e96035cd426587099528ad898e8aa1ad5c615e832b13a73a4bc14c0c8e6ffa882591a1bb9c271470e433cda0afa189f9056f1b62f17d3670289b7e18c8d63992b979639723ecac63a757b19c3f83cd71c725d15119892b69e3f6ed9ed5a385d2020f62297ffd1f905ccec7eba7771bfb84c394095b033f314c2a41d16b14dc46c72b6ef75589ed225e889e4a6a72e7ee243735f19e0ae6f207f7cf4d4192bed0796ecf2c986b26e3025e71a71cf1330576ef1db9515c03e0b9bddffdb59c37bd3c0894b4d8a820ae77f2a3307fa3f36190a5f0e93bec19980604fe18eb0e027f435ed1858973de944790a23e93a3819da5158b03b614af97ea8bdffb45fef1fc00228de540bfd9da504148e2192ebb3aa9d6eff422e7f477518a773fd7f09f241702abe4040133adf1e5ed83f46f7d04ddfd56b9f158c688dd9bec5391d91d0df24150d503d247d030e49247fe9980f17ff211fb28eeaf9cde4d5be965da858b316f237294464668bf459bcde54ab9bc08048b875f5d65b59334f24fba9cc7663dfc2a09768f12a4399762b5b4724f03633830248dca7906575ae1f1f5deb17c0181c3f5752a832bb14c0cd9ee48e3116c6721796f2c98a19c9b2437420d07459315264148ba31e5f3905c93322efbbb1a1bf84955bb55487b0bdf1a69c40da966f5503653d2011b0f5c73a28ae4711416c0222658419d6ff91530df54b8119d47d985a4c43c6a51b823c0df1fc505b522f5fe59cc7adee2bf8892454cfcfb12a78fcb52c75b99dd36211c061c420486010b3a8d353e930f014aa85023fc780afde337976d96a1bad4666b9c7146041a12c2eb79dc01afb13b57c02b0a853a6952b4bf5361b0f745c48cd7e9740688e1ec8ff24e853b81912a0b52293ce0d2de4eaabf27ae74ce49e960d4a1f14496ccd6585e1b87ac003b3fb8b02b8bee04097dc6d05311392e215d08f62075c34f78a1d3d2dc7fa09466229febe17d741ae520cf90a0778ebcf46f6387cbaf5d098c09271f824588ec7e0f3562c7a70f74c3e689134ed242ddb3d019554a8d51b232e09be7ef403ac50912deaab53449b5eb82e5edbb917f249fce6bbc4cd188be878d6493d601c71c230e9821767b568242beb7aad701ed2955d562b811e83f5d8cb89779073fe0f4a0e1353a08151fc248e4d291c30113d2db9fa4883bf3a49a1d2089e6edab1d2d8c46b361b09a6242043c9fa72b38b6db00f3833ada59c6c0e33f41a8e23b552849d03ccbafda132ba0e39874f750b8e87276178f4699bae4afdca463b08074fcabe5d5b4657b0e52890e272d62eecf7d3020d2ffafc50ce084fb8ec2f841c1d60d6fb9f25cfbfa4e80e7c5456623c50953abbd6dd02c373023eaab56f0fddc444f2962b2426877c4468833319511582c251572ea163af712d7fb17ada1184c49350db10b4b283ecdb4b3a4905c19c36677561eb898fd185a2152a45f5de72920c03bf2a3fe5ad8ce529db3a6db9032ad10b46a2b54a476129d5eb700ff925735a461b57d22d5f6e8c48108cdcdd940fb03fc55d8c4ec8633d80807f8ea059e82cbf0d083ddf40442e1f7a52daa29166ee6af06928076a01865fa3bf874a617999a8885c986d755d867730b94703ed5335f6aec43e8f2de992dac1d25a935e4c7eabc1f67b24311c5e193133bd147222ed012517225ac7f29644bf9a00a639e81b887e1fd0a34ff763239bbe223a939069b9946a3666383db3b10da14cba1a457335ffee7a9b0ff167ecea9d30564cc262db0fe03a487ff439a9ee74fb94211936cdec69e76053f008f9dcb6bbfdb476da63e04d1800e78b76e87868010fdae2988174100350c18fe7af1e244d6eba41e9024c3be535b6364d77abd35eb637cb0bd461632d3631839f9267205d342700b06bdb6ff0a738729c95f68f80e079f4a0ee1a60b0d0da171b6bdf6c38a69293e5137ac1d5465b28ccf468a7b2f72463a7c7ed17d0ed7f9e3d71ca513fa62cf6c6efd4197b2c634e190ffec12d35132751594a5f45807b4277e003de127bc07bf678e455b5a57dd2fe56a7900e7ee74ae748373020c88ee846604f325d9c03e9e743cc2bb57d0f5e2b673e29d1e79d182d6d764f67d7a8e23bfd484d164848a16ce4bef44806395aff223315a547a60770c0364647eb2d98851c2cc493d88bf41b43fdd756382e5c3fb1d60c4ac80b154dc603160cc7b5df99f34cdeca4d50602d54684122c6d3c3be82647d342b330f348f2d60526ca20aaed0aab52464490a2c630312d6cca75f03510d4131e1f8ba518b7c8022849403cdc6df0c411d26d16a02c993f092567c3c35a1c53abb48aea7943daab782d33052a82ec660c612057efe7aa252185e996418e1da5a5529874cd237a636ca9aff86299cdbaec144d36726a6d6ae1df3b8d3086f828e6c53ed3af3811224f5f99bf268b98242afe5d5a5e7b16f478ada0547fa1fd67cbf059d926fa054892aca95d55c10753dcf3ac30edc31a4ce85c14bbcfddf92d06484c74d3edb3a28891297742065f03a176a830895d758a11fedb3ed34b62d7addb0978c9953ce8a962f918fdb6ff836de6874ded230397c3505799097948988e482c3961d32d2dc32b83bb0992fa4c370ed95ea447f67b8d260dba49d459659458d8fc808ccea733abcb048e007b94ee658c32e31d894910a001afc363ee00c2c0fbf62de22ccf4b2123e2b4a69ff33f4fd31b0e3d022d07dc920b7fe7b7d8ca8812dd9d05197d883abfe3bdb493f1e7165d9e32842385d7f4d27858cb91dbc18c5e5b1718767a778350f14b264a839210038f0a5c55668802ec6905b106c7967038dad92ff825cc7190777124b5f8c99b5dc8d76891b80fc78e3a5c42d4dba40e69c2c593b873539d8493bc0dbf20e90e08b30319490ef965c10ee2bb0646f216241db4fd60821200834142c6703c98eb7a7eb48c5194b89f45af8be0541efd3e695e24521981125273166d8e4bad1d195ffa855118ad9159da76de3bec4ec69886e56208ac752d67ae5f7d151e97ed549a8c3c5e01312a196fc622eec42815a0b96992147e56c56e9aa0e4914f92d5c8c2d13cb1f5583c885d0c08fc7ae1a670431b0de54329f727867f152b39fe1c5a2bd90dce338648fd2bf4f391c7b11073bb7656fb864bce1730afe54890a3ad2fa2ff87b1577f9fdf47144c6879f5371cfb7dd3e408cd94bc0816ebf2171229b6c727c183541aaab508d1068ec95b4a62102bec52cbfe61bec0f1d329fdc1f0f245db2d32fd9a528e2bb419b435a6e628e1b8eb153b986d9324e7997adf31454f708299cbf1d82fb35402e33f2e3c2df1c5a078bad4e34162fd9b7093333011aa6f56223f9e02de260e42", 0x1000}], 0x3) 14:05:02 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x0, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000140)=""/255) 14:05:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r2, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x0, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) write$UHID_INPUT(r0, &(0x7f0000000400)={0x8, "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", 0x1000}, 0x1006) writev(r0, &(0x7f0000000340), 0x10000000000000e7) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1, @initdev}, &(0x7f0000000340)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x17, 0x9, &(0x7f0000000240)=ANY=[@ANYBLOB="18140000", @ANYRES32=r0, @ANYBLOB="00000000000000007db73000ffffffff7bf00000ffffffff1800000000000000000000000800000018180000", @ANYRES32=r0, @ANYBLOB="000000000000000006207c0fffffffffc18a3c0b8ea9b914d27f534fc04d803b866159c1fa4d237538d6419ff40db6758cdfa0c47749acabf8bb24167d8f1b222e3950f44c051f20c2d235dbd8a0202e3ac9797fab2fcfcde190dd3a69dd76224aab70817a9d4b64090d360f0bc4101e23c016f733051b78a09588178607e9ae52cd07f75a3e8c"], &(0x7f0000000080)='syzkaller\x00', 0xfffffffffffffff9, 0xff, &(0x7f0000000140)=""/255, 0x41100, 0x0, [], r1}, 0x48) 14:05:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$LOOP_CLR_FD(r0, 0x4c01) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r2, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) [ 170.644230] tmpfs: No value for mount option 'ev/loop#' 14:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x0, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x0, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = getpgid(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x4, &(0x7f0000000380)=[{0x1, 0x20, 0x1f, 0x8}, {0x7fff, 0x800, 0x100000001, 0x9}, {0x1, 0x3ff, 0xffff, 0x7f}, {0x1, 0x5, 0x5, 0x2}]}) ptrace$getregset(0x4204, r1, 0x27, &(0x7f0000000080)={&(0x7f0000000140)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r2) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000280), &(0x7f00000002c0)=0x40) keyctl$invalidate(0x15, r3) 14:05:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r1, 0x101, 0x70bd2a, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x80c0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x13d}) writev(r0, &(0x7f0000000080), 0x1a6) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000001c0), &(0x7f0000000200)=0x10) 14:05:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100), 0x4000) 14:05:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r2, 0x8, 0xffffffffffffff9c, 0x1) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x0, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') fcntl$getown(r0, 0x9) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) 14:05:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) getpgid(0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 170.837605] tmpfs: No value for mount option 'ev/loop#' 14:05:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:02 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x0, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x0, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:02 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f00000001c0)={0x5, &(0x7f0000000180)=[{0x401, 0x7fff}, {0x11746129, 0x8}, {0xfffffffffffffffb}, {0x7, 0x800}, {0x1ffe, 0x100000001}]}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl(r1, 0x8, &(0x7f0000000000)="7d2949b192f0bd4abf2bc5269937f8d78bba9d080a72e3abcf9c59dd456fd73f7b6c34e9dab3f2a062b9ca50b388a560ff1d914c3146ed0600c9b2d7838431a4e88d7d0da359a5bdf74be7491b1c85b7ed7580f0730dff4bd9d2bd4dd2406f7078fb12f8a618be941933753265da47f73afd8775be1771115e3621a38b510f4a766530f00f798e37fd655fe572077e22f081940a670da080a1db24a7b9983a57d0") writev(r1, &(0x7f0000000080), 0x1a6) 14:05:02 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:02 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) 14:05:02 executing program 1: getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000080)='ne\xc6\t\x93\xbcp\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:02 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x0, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000000)={0xff, @multicast1, 0x4e21, 0x2, 'sed\x00', 0x20, 0xff, 0x2b}, 0x2c) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) chroot(&(0x7f0000000040)='./file0\x00') writev(r0, &(0x7f0000000080), 0x1a6) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0xd5, 0x2, &(0x7f0000000240)=[{&(0x7f0000000400)="a788cab4802be8632db7b4c981156b2749fe7c885811f92f2677574a777d8eee3bc5574e614874435080025219e0ce1d5297a9f6e5a35c28dcedb7d1b0866de5c0685e562ce27ab25fe219157e1386a90883cded98dc7f103fd23d7a75ee54a30c5113a1c4b10d58471aeba7d7447794cf6054dc260e2a8ad8af4142201d4920cb618f917e6f656fcd41e8be81f86f894a4fce4d1019fffa4c4206f7dc95737a7daac8935edc3a52fd7c04622ecaccb13682ce47758118f6f1a99f6c5c14c0308990efc310166273ba3b0e9d791cbb2361e32cb836472b6e8be7934ea7c0cfd2c6cee202040c1816cbd4a165295b2a66b6c677fb08d8837dd5899a53ad17e14b3c145c92a90243f337b74d1059852ecc4a234c650e7d5581036f2d5647aa5e1db939bcc74884d720c85e702fd5321a97f9ada8021efda25288bf5842cd8514b8f7058a4a599f6eacdb649217d0cd17b91606556557f6945235e413bdfe0c91934c62298be5e3c4c82b5c58f568eb6f44161a505f7a976e5b2b88895c1fd257703be71fe9f55a835cefb2f6397c1da4bedee2d3a1efb59108fa1e513235e7296099c4dd054b7579e46d54c129e85d297ee28a4b48343901e20c95b75b32350280c46c8dd4cee52c9d5858c7ba92d7764207974e1bc1e0e15ba9883d37259f62aa2060ed63e8dc24dda72dcfd016bb6203332818bd83629a6f641664c69247b2699c116c321fecf5e3cade3c8943fcecf1975f60b1f861cf2348902631c2c111ffe95933cc097e667232b6db59bfec962b2366d4301ad9b52b11bce0ca178bd8096c02824b6ddf6e262d8f1e22c7251f7c9f6c0b0b167172ed3235d3605987d6be41e0bad6903f59c209eaad94d36933da92c9ea819ddf13eb4083a6cf72f6daaa096e68b1a7efdbbfdb2edaa23ceef0a907e4de048d5282604aa784a7bfea0364263d39ff846a67f0eb1334d046bb9031e367b275e2ca85b9b6aace36183d0136cff62c0ff9429249fcf73d8ea0a9c9d1e01848b3e2f86f044d9a9ae8d7dbf842a39728cd8a274faf9d9147bf309529adf9efadfe7de7d77120ad25ab658936dfaefbbc779abeb597eb687893905ef9e9eb6a59e2b337e2e68d6a4b989e042c7681872370c85ad4895e572ea04e7de473e21611691434edf159c505821a8fbe5dfa0569d93d32ef80ffb3220a2642f18fd0e3fe8a23f15d44afc7e3cc39a9705c90fcfeb40d5a64aaa57f452de6875320e18e46c954e6c15c323740f43f3186ed144e90320574ffdb49b0b37b018c8dd358b27087af4941647e3370a82851a7e8af922f38a4fbfe5ec4ddbe5474d6a4196b7ca291f519bd9dd4ffd132dcd84fdd930cf29759a793b1150fa03622878118501f55a7a7689dbdd186545d61f71905b900023e0e65555fb743d317067b9ad624763818821b2f49cdeec47ca759f5c271d7f5f873f6cb44c5e1d70d098f08196af944f0b09ca0c22ca3c4abc892debd55783e27c7e0d53b3e5424dd701446330ed0a2e450aab57e129c8e5440b12805d3d07afa463912941f29951b3e7d93f28513c3ed3cd7a154976479b452d8ab8da13d151d7719d52823eb5027c8269a08bbf0aef715dd7dac3accb108eef8863d7a155a5047ba58f3130d9100e1d65da953e97fab0bbba011982a7bcb07da96f9d5dafdde671e706ef39d5537cd48cd4754ba9d46a917e93093983d18dc4b95e5fa265232d04edbc7888294a49c10b2e1a67e8e8f766c92d335bcde122dfc328b86b9d1fc96822779ebab29904b52a121ea97058f9090c69f063bea920109e0c1145e76bc82ea0c1a5d02be0a38378ad929234dd7c3f9af82ef9418ef4a0bc5d70f96093e3343e59dba6a3264559264bfd69d2c212037e522d5d83dfbb96857e9ca369e2d0ba059530f595bbfe9695e22f581cef7e11eab324244d4fba5755c41ee428a5dabf26e8dbc0ff809134bc197f8fa1fc95559ff62926e84ef2bf59d1b8fde617651ea67db03686cff86d36b69538b7e6f8535acb2b81890ab8f9f3358afbdc2bcdefb3ba0c4bb34a10ef86a67ddd46521d0c4621f36d76a8fe13ea45d43536eaba00ec18eb0d9c5249f2f6c777340efa61992ab0dfec877d3d623fdc72f37b194047648db84e837e09fbacf8a3ef7408146d7e6a6ac5c5451e1f33a50b319cfa98b8eef8b7cc5905f69a5234b3db7ef6cd64088e01a2f349be287151ee61cbba67e57abc5918fcb3a77cc2315f7643db1a6d100b6230ec7945c6f971dbfd9dc3a8775979d66a8f04377533f7b60034e21483bea2741d4d60218df2ccff9ea7a42eead6270131a51de8aae8ec73b32333bf94cb49b3181bbc19cf20917103722e7aa2b953eb7b64cf4037129abec32c3b22007687a7792bdacb0aed93e39cd85c5a997cacbdb4e34cf282292b96b72aaff93804fd2053d708679ba860ba5f3f2dc3aa5ec850b87fe32b67b46604ef14a84891dbbfc5b61e1b41c266de68cce9136617185be1b8fc858a934cd51b0aee3bd4fa487e105ffb33fbb36b4a5653cd6a79fb646d9430293229aaf3a8e0a515f78c074bf8223badd6cabff8b1d7190eac0bbb1071063aed4d1ab9568bb9c75ab3213112be08170a2f836a958aacfc961d333cd4aec624c9f12e6fd9082b4c4686ccb4d149dd9513bf24d571453d9d7c0d10c5456472900de0f3aa3b956f347c23e3b9e3052052b099ce950859d5d4570667edee96e0563e5105300b1e0b53d58421f8f4e6b16f4b2055c5a5bf4e28a5fcf52795a78d4d351a7160ed0cec008c467e354ca0d0fb049da44856480fbf6d056f1020d0ce2fd4683d23b527f06c5bc47363a077ff48f762a285497d63fb0689c6ef1f9bf65c7606788878fc0720b3e166c0d233dd7ac3b58f8dd8c7c0e736bc1b88b444c9c3aa0c138259d9279cb5ea66c01d67cb1ad9275603e0d7ee279fd008782036f5be9de7d9c1876ff5e6137035266bf05d9db81aaf4a95c98f34e09afa95cedafc8b95141b3063497a10f4aa8ab1973f748b79e8106204d449b846df3fbbad8906369b1a49770a3510ac9439611943570765e9bc1964fc19f72afee4195e663c2e1d06681680d667d019bf617387f950c7cccf7427feb1e70b99178dfb7b62db414073729589cd6bcf830aca80b3ca09c4caad56a8642decab93a4ab31546c5dd27608ed488d24c9fb32e31c9a2a69d3f8e9ebee275db5362b629ac6673cc78be3540837a9b51ff8408036288a3d76b71512274111662c6c98df8d1e7ad36d8ff8b0b7b647b8b96f8efb972fe41085e49890dc01a7bbe3142856ba8984b5987e104afe048f0a69f5b702cfd861e427e5ed03d9dfaa309fe03ceef989874d725da95a2342bdfc1fa0c47d70b5954303df3af7cf80c7767ac9ad377b7e95ef1f3b7f9dcd9383040af5896fbfd2e68ba3dfb4b40d55ca3238e15e2f489fe4818a5991e4b2f4756ff0b5e141ee10152c0c7e43283c89d2ac1b73547636e2ae5826bf8591bdfdd3f106ed23522fd442ccb5306064ff985816df0b094b801b8fd6184ca9c2bb9100d3f98d2117b7886514598ca0931fc78250e70aae52495b0a88b14a2a273ae12e327bc08a00e6bcbf6c1378fb3e745e0d5f745e10e68d2b502fe503f44a3c98a20e73186d2525fb53c7743e7afd5e5c0eadf0c91eebf1064004f154146d0909256cd3d380741b3ded353d87b707ad9089c887cde0bd8c96c781701e32631a5268233c9700f0c0504a59815fc87d0fb2c086b3e0980b298c3e5997dda2d503e303215f92665311d24eb356ea5648c5139773dbe91d193fb84b06b2a99e52abd72741a23ec7619f7dc65071e7f74a0f623f0b397ffac1ece8a5d3f708f9e83c57ba35f585844910b1a435879b3aff79ce5fe8d550957a216f8ff045cb770b7f491f525befb79d74f124d33d2fb2838ec505fcedf0a81ffbd0d6db407799b70b265858b8b7245db3ccd2f3d98916f99b62efe0197769918ed238124764b96ea119e7dabb43d12bb11ddf1a39a9cea1a0d50ccffb1eac01c0574fb01556a483eaa6d93367fc0c02089b20a9e8ea3df05b3066ea930f461b4a827ab4b120dbcf4f5755a9c0c85e16e616c44e38953069b43bb8848fc5769e0f4b33b7e97a108023476b89e642ec3f3b1dacc44e206e8ed6abaef63587f920dca697d7216725445d541e016992fbecf1a1ac62ecafbd68325617b731ef1db0eb16cb38ae2b321a8ccd5e5ebc0ded6b77722bb9b321f0c96903de350f92bd0fc7b6a0c3710738f892fcd26aee5eb0554d17eb33c00a8f7451498b4833aa1f003d6982bf3ccf1465780434f6a2cf32862010fce34993afd630ddc273cc0d3d5b40521509b35f1ac4e77f53f6cd4cc98975d1aefd52a7c9b8f6f920b6d5c48f614730e3f766d36c8a42a1b9065d1c36638a357ba93cc5f9b45b6cf7b03e164e455d1313e1f4131178e17972d2bb1d102cd809fe8e2dac5f502d5ca6d9f7e1beeb423646b9423cdf6cf2563a3b9cfceaac895302a7e654777eec21e56c43052eed358b229e28529d77880c1882d9b60c146ec9dbd55ee87ed2e4e72ca5df4a507873b9232c712f02d7ca9a79445e42dfee0135604c98769841cd5d54124f440916e7b5dbb38765f6f4ac6c252dd765e5dee20679f7adc7400e0c3a70be43fb77e01d881eaddd6e5d2b5b889b2d870b1bae7df3c9f497241913c7b70f6e769d911f6ed5f4f3ec437bdc3dfb13c7f940564e0cf4979ca4ee5e84934768395762b6faf8f5c1e4c8c9a34902165b7ca68d6204626c1421271956fb4f589e96f6f52c32346100cc10d67cf4dab3b5b077527402123016fd7b0b0cbcdbd1598c5a14be9f0f002c35e2e71b007a0527621dd90d6ff91150705310ee80420f26255a48febaf3d903180e9ae85225c5555d684f07377866250b885642f8a7fef6ab921fd14696d97e8d063ab7ce2a4a90ed6e3d61469f47f75bb1a188b703832f0909d4d0ef2944ed49c6a906cb8938d73a552b733424848a19e3f5e4dda04b626aa5c096c27579edab6ed31bad522a3bda414fe86981b9eb0b4d8ad68f71633fcd0c94bbf6b5493c682fd93ea5e12615cb6c63f908919a9fa825ed0ce4e00c30135ab6501e04adb81893ede6e18175a2468807b7f402d42991ff484e04828d6e9f26b58daf6de52b40e03b7edeff844f4166398b5c4321445a6fb0bcbdd2ad2771bda4bdb4542739ca5c85dff43c3fc826d923ae2470adfd7eedbca002099acc0d269d4a44a0ed18b753cf9b21220b05834180ac88f07f724fee085f33bf1d859373b694644a9c58192e99df24621ad1a1c8a24ca9409557ac39559ad52ac11498df1d18a37ce5f14998811e8b1d4dbebbf5f4716a323becc3ae3e17e2ed7ea52a4f8418b8bf4722a26c716d7ce9b8de3c20b1d4f59c515f4c83edb600947ec01b14a1b86c22a4d66c3a50529129faa79e1fec82cd3c2595c4eeb81b0bf33538551f657ae0ce7d4e171e1cd1b951152a1789409532247ea565efe3ebf31bf223f6420ff7c58c218206f05c73998d1daae5aa32540ba327e9c265095f46960ee2b5ef0758fa324825309ddb9ceab8e67520c203f2cab8fbc3deb8ab1a634b94691f89802e972a3292b64890f5a2286517629a9891acb0b50e4fc0babaea79c0920c787dc2d0f9f13b93265b0d39e764ddfcf5e7b8a6945199c3142b46aaf5cba72bc687414ba96cdb4a93446604ea42333261dc7d11c4cd56545a7701608a43730904f4af75334553fb6e86803da842dc0d7946bb911ee452baf8bf6a156bd064605bf1f", 0x1000, 0x40}, {&(0x7f0000000180)="04b256c3e4885e857a42a00881db31766144903a162f0cbbc12197f5c7de583a434da7f9d8092a99f754887221cf2fa8204b37fdfe820130abc022a14390b914e1d57dc75362a69898f773ccf91c6dbe4fccceab78a66391954df90099ba3af307cabca4f29d81ffa84c1e04b1d9ac07ce6e909cfe712120778610457cc9f9cabd8eddaf1273184217b53c4820e96a5782f87044e2818380f81dbf5fe7b4f89aa6ec912083603ca16024e5b9b43d308dfe71ee68ba1a3ac0ccdde1bf65", 0xbd, 0x4}], 0x2010000, &(0x7f0000000280)={[{@noacl='noacl'}, {@dioread_nolock='dioread_nolock'}], [{@appraise='appraise'}, {@audit='audit'}]}) [ 171.023512] tmpfs: No value for mount option 'ev/loop#' 14:05:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cm\x00\x00\x00\xfc;\xa7\\\x92\x84\x1b<\xb0P\xe1\x11Q\x1f\xa6\b5\x0f\x17\x8a\x85\xcb\x86\x94n\xa6\x90s\xe5\x8a\xacxM\xd4\x02\x1f\xce\xb3\xe0Q&\xe4\xcc\x83\x0ej\xf50\'\xae\xc0\xf5\xc8\x9aW\r\x89\x95:\xf3\xba\x0f\xceR\xe8\xdb\x83\xe8\xae@\xd8d\x1f,%\x11M\xfd\xb4&\x1d]\x7f\xf5w\xcfK\x8eP\x04\xee\x98\xe9\r\x19\x97\x10\xc8\xfbP\xd2\xe69k\x98\xdd3J\x92\xb1GE\xa4\x01#\x90Q\x11 \xb5\x13\xe6\xd14\xca\xc5\xf2\xbc\x9c`xQ`\n\xb5\x97\xfd9\xfdV\x15QC\xd8q03@|') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000140)=""/246) 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x0, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, 0x0, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r4, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) [ 171.125550] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 14:05:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @remote}, 0x10) ptrace$getregset(0x4204, 0x0, 0x202, &(0x7f0000000100)={&(0x7f0000000000)=""/126, 0x7e}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r1, 0xd01, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x96e0}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffff7}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7f}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x35}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x40040) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f0000000080)=',nodev@\x00'}, 0x30) sched_setaffinity(r2, 0x8, &(0x7f0000000180)=0xd07d) 14:05:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 171.207824] tmpfs: No value for mount option 'ev/loop#' 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x28, r1, 0x610, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x5) writev(r0, &(0x7f0000000080), 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f00000001c0)={0xedfc, 0x7, 0xd0, 0x7fffffff}) 14:05:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x0, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='comm\x00') setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x4, 0x1000, 0x4d84ab22, 0x5, 0x1}, 0x14) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 171.375863] tmpfs: No value for mount option 'ev/loop#' 14:05:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x0, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x0) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) recvfrom$inet(r0, &(0x7f0000000040)=""/169, 0xa9, 0x10100, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x0, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 171.512275] tmpfs: No value for mount option 'ev/loop#' 14:05:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e22, 0x1, @ipv4={[], [], @broadcast}, 0x2}, {0xa, 0x4e23, 0x5, @mcast1, 0x9}, 0x67c94767, [0x4, 0x0, 0x7, 0x1, 0x4, 0x7, 0x173, 0x6]}, 0x5c) 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r2, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{r1, r2+30000000}, {r3, r4+10000000}}, &(0x7f0000000140)) 14:05:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x2) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000180)="790995101b487bbb2b45573ef7ff6949879255e9d8285686814a4b482714b9eb693a3b9d1475269654891b5d96d9ac6f321d43054d6bc11b7bd41ccee9d16ff8005796a0f6253b2cb7b7c5ce7b67c19bab50bdd39116af485cc3cbd21276440d4683d41a60ffb0b8a338d38a7825f2f095ebf83027c4c9d8c2bd0a9cf1b1c139e8bde730d6", 0x85}, {&(0x7f0000000240)="40f92ff1128119a6bd590bc60ef181c6f9977e02283ac4e3e1c09345b28d23d3422738247a5bee8f11f9fbdfcf0fc11a6739d1b3c7e1eddaad9a3ea5b368fc8da69b719efd673dda6124479137a5da0867ceb40ba80c201bdf12211ecee70e765efbabb1080adcd69b8db4fe18572a6155adcc2c368e8f58046dcdcd5b220ed967cd013cda8debbbb9b985dcc71b733d4c649ad8768b2232f7db5d57", 0x9c}, {&(0x7f0000000300)="f9f728032f10c786eae703f9730d9e5a7d660c69ec7356d389f503a222a722", 0x1f}, {&(0x7f0000000340)="8e", 0x1}, {&(0x7f0000000400)="b5a846ac6480ea6a2cdb3c21e3dcb76649a1a3676349789f2df72a5e2f1874525b845cc7f94549c855d46c9eee6ba41dbd971c305e777a32d98572f8ec499c8eb311a07468e3bd787fbe0f22b4d81890d6b4bb7e1a1fa40f0feb06a3cc3cba1c2087b776df87573c9b65a51bb40de72b27cb31d005eb3e5e29bd69b407f0db176f458f852d201fc0fe894fb5639edb2e1e591151b98ca8a01814c50f1c22edb0bd3a005dfee0e2bd93be40", 0xab}, {&(0x7f00000004c0)="46aa0af3d80ae004b6369e847078f9a65b3135b941e86a48d1aabda397fe0917425c576f198c7aa69c66cb93a9084af30fe8ca6fe4812f71d8cd5376d013f6e8c866e53f824dd5fb9c8a8821d27ecd673cdf6be3f0f6b8a82e32478ce2faec25100f363a214f42759c32e5e707817822d4b6d0922936bc4d21a1f6b47875a97840880c46ed96029759beeeeb29f5b94c017dc92dca397364c5e6f3f4014615bb336efdab12f80b08d9e2b3ac76c7e78354805272600b3cedb0bbbf5747ca6e9f4f31612ecd3b4b", 0xc7}, {&(0x7f00000005c0)="ed54193aa74b4a3270a815a99a31d03dd40cdddeee3f060c1d17601dc835130328027fae909985ad4698414d6d5ef7e2ed9bca49e454b15c48c5176a5c809b9a4d40bfdbcad5cbbe21de0d5c8d1f4b2774a01bc0f044", 0x56}], 0x7) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f00000006c0)='cpuset\x00') write$selinux_create(r0, &(0x7f0000000000)=@access={'system_u:object_r:dmesg_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0xffffffff}, 0x46) renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') 14:05:03 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={0x0, {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 171.645462] tmpfs: No value for mount option 'ev/loop#' 14:05:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x0, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r2, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') fcntl$getown(r0, 0x9) ioctl$PPPIOCDISCONN(r0, 0x7439) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$getregset(0x4204, r1, 0x200, &(0x7f0000000100)={&(0x7f0000000000)=""/126, 0xffffffffffffff98}) syncfs(r0) writev(r0, &(0x7f0000001600), 0x4) 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, 0x0}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) getpgrp(0xffffffffffffffff) getpgrp(0x0) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r2, 0x8, 0xffffffffffffff9c, 0x1) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xc8, r1, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="aa8604e9572b8dfe7a3716535508a9c1"}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x52}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x56}, @IPVS_SVC_ATTR_AF={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='n%t/ip6_tabl%r_matche\xe2-\x00\x00\x00\x00\x00\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r2, &(0x7f0000000080), 0x1a6) [ 171.803693] tmpfs: No value for mount option 'ev/loop#' 14:05:03 executing program 1: ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000000)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(0xffffffffffffffff, &(0x7f0000000080), 0x1a6) 14:05:03 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x0, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, 0x0, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r1 = fcntl$getown(r0, 0x9) ptrace$getregset(0x4204, r1, 0x7, &(0x7f0000000100)={&(0x7f0000002740)=""/126, 0x7e}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window={0x3, 0x7, 0x1}, @sack_perm], 0x3) writev(r0, &(0x7f00000025c0)=[{&(0x7f0000000140)="c78194c23d2b59f2f749935c43a43947be954367ec899bfb6c705c32949e791e95302ad676a1fcbd7f21fce58811034331890190aa852881d999483b6caf2c16fb4847812dd68682b5759eab6a6dcb690abe451ffd83626df39926c5dd83ae9694fc45d0fac3f600aed14bd63303ab838bca7cacf65607e3179baa06595608434ed7850ad37e1c4930930553fac61cc7bb14b90bb27824627127a62bd384b1ac52a69630c1f4d71ffdc73d85570d147e6e817285084b4f2b7d602b3962cfbd83ba766be15ce49102a28941406e46914404ec2c012c1aebea1f9c9b852b3b4149db760ac8537432fce3b4b3ba9c2338939aec152858ed", 0xf6}, {&(0x7f0000000040)="7c7854ba304a2c9611755682932c5e5fef236cfef1a254f95edb53b029544fab434a1126706f73bb225a295be18ae21028a3ca3040b071299e0a0d892218c4a402757c37fa71", 0x46}, {&(0x7f0000000240)="3abd4f01cdf2f079e87a9d9b7d6862f42f9e6e82df6471f5fcabc881cde8", 0x1e}, {&(0x7f0000000280)="48470003892d977bb39e86b0fb04f2f328be958e3fe40282a81ef91a15df0b6516ced563647136e7d27bf972c933926af5ec3a7f8400b0d6a7ed94cbeecd7ce87f046b63cead1e95e34ae4eb8dd262a2d0d70c3f0a8fa5dce72088df52527b5fb4c7dc46c8e8d3fc4742481eb42607b62abc26b95dc14a7a14832b21a146d80020b516916c36193a66f5ef239f0e617a5b097468e2f80cb451b58e171369b929cdce7b21328d9715d92dbdbb4ebfaa1ae317723ecdd739782a7bf52093e47003d36c1c7c8aae5103a36278933c4f512e43", 0xd1}, {&(0x7f0000000400)="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", 0x11fa}, {&(0x7f0000001400)="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", 0x1000}, {&(0x7f0000002400)="dcd2be2a2be024b1dee9ea208003d0f7ee3fd26ba78243bbb4eb6fcae9debc500c11b4f5d33110078a7deb5c0a0ecfd9c1a2cb4a03a853869b4445d4756b406c7a4f26827092ed5a27a786b2a9e4aaf6c7a462f84b441975502bed12e49e68e72fb2313513b7418b016b5ce1653edc1170c84f2cda84f04e6bc2a2f5ef9637d15f3633f79bf0964b22ce5be6bb57f3f1292eef4d0e93bc2b0933b8e8f556750bb4852da00516c7924216613f32f675ac4c03e01acefdb13114901b27711c7fe8b998a89e8628452bbcd19378385827f261c1e41434d6c072dc22cf66d6ac330d992245ef1ea61dabc90986", 0xeb}, {&(0x7f0000002500)="81938ccfe60bdf621462591281c9c579acce65abea644d0ce712045ba7090b8752c40b22c3c984f79ddcf0b34340f898aa3b4afbeee719fd3a5aec484a2a391beb1f8b", 0x43}, {&(0x7f0000002580)="91f99674afdff51191487b437910", 0xe}], 0x9) 14:05:03 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) getpgid(0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x400240, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x200) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x0) 14:05:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:03 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={0x0, {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 171.974392] tmpfs: No value for mount option 'ev/loop#' 14:05:04 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x0, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:04 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000080)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, 0x0}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0xffffe7f) 14:05:04 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 172.140802] tmpfs: No value for mount option 'ev/loop#' 14:05:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x0, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x12, &(0x7f0000000040)='!eth0wlan1\x8dsystem\x00'}, 0x30) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x101001, 0x0) 14:05:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14, 0x80800) sendmsg$nl_route_sched(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@getqdisc={0x3c, 0x26, 0x8, 0x70bd28, 0x25dfdbfb, {0x0, r1, {0x0, 0x7}, {0x0, 0xb}, {0x4, 0x9}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x11) writev(r0, &(0x7f0000000140)=[{&(0x7f0000001400)="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", 0x1023}, {&(0x7f0000000180)="b621a45a19b8b50f3cfe964562d467d16e13334f299afd8ba4ee654075d11f0dfe1c966994e602b438a05adba7aeabcd87ef12b5d3340a2c0984ef2f330dbc712813ad5fe34a579c32279e21e7f0abbc1217b3d59e0f85f3ef50be80f1ede1ea348eb391903c35a2a3a26d8ace6dbe10df7caf47642e6e397ec5e9fb934f7c5b880a9b", 0x83}], 0x2) 14:05:04 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='oom_adj\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000740)=""/126, 0x10d}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="48d9", 0x2}, {&(0x7f0000000140)="8204de6719423c38914f7d74220e1f8fc7435cbbe8f95bfd75a38f7d0238cb7aa429312fd9c2b71c8c96e72ec40b643d8c8ea64f04ee91e98df71e51dbefad1046c42851dffcf112791af87dd079454a4b2847097592ac4d069720eca32980077508160b38c1b1240a6ba3008913fd4c7a980532f03816be6f35e3ef0ee28ab0e397ea8fefb914e4e95d4679b9189e133b22f9ef50eaf286251aae81e96513dcacafaa6195e05d7d411e9a2652cb839da084eb889e08", 0xfffffffffffffd43}, {&(0x7f0000000200)="d2049aaecc8fbb679213c4039acac7069cb8f2cc8c88a2a95daa680fc18e1eb850045cb06d9a", 0x26}], 0x73) writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000040)="90a32030db627bb243994ede9a974a8c1e3610f787ece9473316e8721a3edb0a813137c1e4e5639f6c9c71d59e83c98349bb05e3c2752d3e437a90e2964f10998393871f799ff9e727c5b18ff24d82db7a50608020ececcc2aee61146840ff6406a017ba074928b84f673276eb4d8839", 0x70}, {&(0x7f0000000280)="ee64d1a89c9f8570b9d55abc25358b13ec9b8f5a4e5f898dde57ba464c9f85c7b8a4115b599621c6b66fd7861ebeb0ef97c96766b5f426f72f6bafec35c5d785f15f3c94af7dd8c654eef55b40a554b235388dfa67a20b2d48ffa7b6e824d3a64c0b42756b46a7cd3cf09caaf7260010150ce5dd4a61553d89ccbff5f0681e2815dc2c41a42587181e44b622666468db725c383a5d152b3b885a219170196f85054b2b984614ddaf6c5cc8b730f58f2c7b84d384559358563ae61984113c2f7b40dfb2827771485a920895f8813da22fac1204c9f72344286e83851c0fa17d5d8a67529e509da9ca8ff60b", 0xeb}, {&(0x7f0000000400)="0ca0def543fb0b5bf231bdd050395b627b44a7", 0x13}, {&(0x7f0000000440)="f332f49063a6c50f3f557d96d21d29dc0cd92c131608da494e0fc282313d767e085ea54db63036b6375e18a0c035748aa1a4e14a0ebfe56a326bc44810846c90e7bc6a2e0e3aa3719e59d04228f1e95091fbf770cb87de2d71fe158995254770851885a318d8ee61cbcd0e31ecc5c55a137e82cac62c41879d7d4c1abf96f54bf026", 0x82}, {&(0x7f0000000500)="ea62a0526da93cc33c2ef7c442c60b03a6e2bf62648b3adf0c0b05c9187cbe4e4d5dbc5b38200b3ef817b820e8be3b5ad46c8a454faedf30d735411f14db7efb8a3e456894505f39eba940b66f4d67c60f210a8f7b5e135455423aed06c60a07e761f6adb3c2ae39ece305e1eaeb8864264197aef5240327cadf8b2e2144644bfbab5bbb8d993d298d9ba9ee8fa4c92fe76f4859fb5b6158484a6720876a0eaa661973cde296e2fbd0375da6ce0f344004b3113187bf98c1ad2141b58f05f6b24ebf4970d3837f505aad25e04feee11a5bc2dd639d45bfa7f99985f0166cb04626430462fc110224", 0xe8}, {&(0x7f0000000600)="cf0fa664fad21e3a005195c6d6fd211ff13544383a9eb360454e6de4e426fdaa40171d3e7098d798652af29b9c00d1de749c081afaf8012365b616c1736c0773a7d546c5bdf60446e02fde6c17806d82ffc8b6fb2cf67f63b1465fc3ec16b47fa37452644abb7f2eae86bd663c652c4e663e876bab7d32886ff756d1708c909f5018424f642979d10f1d39c7f965852919bf9957e4", 0x95}], 0x6) 14:05:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r4, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) 14:05:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 172.330980] tmpfs: No value for mount option 'ev/loop#' 14:05:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0x0, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) fstat(r0, &(0x7f0000000000)) writev(r0, &(0x7f0000000080), 0x1a6) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000140)=0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) write$evdev(r0, &(0x7f0000000080)=[{{0x77359400}, 0x15, 0x8, 0x3f}], 0x18) 14:05:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 14:05:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x0, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$setown(r0, 0x8, r1) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:04 executing program 3: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 172.510763] tmpfs: No value for mount option 'ev/loop#' 14:05:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) 14:05:04 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x0, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 3: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x0, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 2: pipe(&(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) arch_prctl$ARCH_SET_GS(0x1001, 0x2) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:04 executing program 1: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) epoll_pwait(r3, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xd236ba64}) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x56}, 0x7) exit_group(0x6) writev(r3, &(0x7f0000000080), 0x1a6) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x100000001) 14:05:04 executing program 3: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 172.693480] tmpfs: No value for mount option 'ev/loop#' 14:05:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x7, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x7e}) ioctl$void(r0, 0xc0045c79) lookup_dcookie(0x9, &(0x7f0000000000)=""/129, 0x81) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) writev(r0, &(0x7f0000000080), 0x1a6) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r1, 0x300, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x407}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xff}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x26e}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xc0f}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x40) 14:05:04 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x0, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 14:05:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r1 = dup3(r0, r0, 0x80000) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000000)="4e89e6d816769734568b60873bf16d1237f41414260b4179451c53fae5dd886f337d64d0674fad9c32917330bbe55721a9b536c954fcccb645bacd1bdbcdc36a4ee14545578ca1bdc2efead42645c1fd8ff35f817449d28d9846438314b1a14a03bba6a2e5ef392ffe929486a108c704e89c40f72d931d6ec9d326eaabb4686a20fe09682b3ce0e39c5f502f89b8586f0e4f86a7f315830408d5492d787c3e67c2b77f0bed56e9178ba1d3e13ac5364d159ef2de92576d100b3e") writev(r0, &(0x7f0000000080), 0x1a6) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000140)=0x3) 14:05:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 172.830782] tmpfs: No value for mount option 'ev/loop#' 14:05:04 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r2, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r4, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000180)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000000)='\x00\x00\x00\x00\x00X?\xc2+~\x02\x81\xf5\xa1\x85\xcd\xda\x80\xe7\'\x13Xi0#^\xef\x06S\xf5Rs\x9dJ\x87#Gf\"O\xa2\x9ase\x87\xdcw\x13^\x7f\\\xb5\x84\xae\x97\x04\x8a\x90\\>C\x06\xade\f\xc8\xbe\x1a\x98\x98\x8f\x00h*\x99\x1d\xc4ol0%u\xd5RU\x04\x06F\t^\"\xcc!\xaf\xd7g1\b\xb5H\x89w\xd2-\xbb\xb9\xe0\xdfU\x13\x89Fm\x82\xf9n\x8b\xd7\xefq?;\xa6\xe1\x16\xe6\xfeW\x80\xfd\x86\xd7\xae#\xc6') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:05 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x0, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 14:05:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:05 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, 0x0) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 14:05:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000000)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x1}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)="f5b968f805f540b7ad4b2ae6148b903428d31363d2794140b5b6cd6c14a81340f33d254e464fd1e5eacc6b5ea3c8d5736b77f0aeed76bdff74f04322fa8e25a5b9107e7012ffb1825217c09f3697b3ec23c199ce01cc4a95fd3cf44c03ef68fede9b37f76aaa7fe4d2d6223e9a6ce71ca987d31c8aafa26180727b66a95d2f3fde711cb665b3cf1dd3af949f0146fc9468c89565cb3f58ebcad1e1915ed7affd8b5b55b0328ff2f105e4a5af4e93e7d86a0d69389af795fb9d470eb6ee1c3e95c810cf66778c5e02fb386a450bfe6b0ee1c99fad9edb5f868826eba9643c6be11b2781de76f3e50c3a8d", 0xea}, {&(0x7f0000000240)="cb7865a38a5394d0a7f46e8271b315ca9663b22a9cd880812dd7801bd471da72ec6942cf3820b139555dad47849b0df2214903926b7b598c1430934380e7c90b24e20968b73ab491d3aff81de1fa358b77b1a807a9ec9ab6688a34f7be4747cc98ef6ce874edd622c503cf0e906a886967386b549b7ce858e8a5600c95704ad86476a4f04cae6eec7fbfa6f0144f685bed67cdfa32f60799ee800ab12d0fadf8", 0xa0}], 0x2, &(0x7f0000000400)=[{0x30, 0x10d, 0x5, "a065d959ce62d7622b33e4471085b0786b8fa48148abd5424d58"}, {0xa8, 0x116, 0x1, "17fc890c576cf4419a7aead7770d4983a3df9e8f14b703b7848c9618a7331932e917c24933c0aca8448bc2680a8709b46bf49a74968f2dfc9bd921bd92ef5ceaf9f0e2e1f2154b4fb3e2c46b883eb69d789e7761eaed1f730b6ad888e47c192f160d2041b9a99a02a1154ff6e3636f4a92883388982c79d132f8f8628202fc7df8fcf11878634b49bd2162e13cd8d8497b1d"}, {0x68, 0x117, 0x6, "37e9a182e526506cf3cc627cb11a39767e14fa9c603e68ff4e6199285a17d90285f2eba469e1159bf5bdbd65aa725b73f2313161d244eae0e47d56edf4faf450093c1dc247fba4a6a4c51d1ecf3bda409c710dba8599fbfa"}, {0xa0, 0x18f, 0x9, "717944c3902376e23d5d160babddafc1835c28e11c97a21aec653e206a78c28150ba457a6bd3d5573b2ab8a87a15c651df58afff0005930e5da4fa685fb8b2f750f024c91e1feda0bdc76ce08344c263fd4b1a8c0de04a5129d222775bf43240ae46c8617a7d7607a242ceef7b843df7d6c0ee5885f9892a3b3ba0489fda2caeafb4670e1f5ede6c86"}], 0x1e0}, 0x40) signalfd(r0, &(0x7f0000000680)={0x401}, 0x8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000640)={0x1, &(0x7f0000000340)=[{0x5, 0x3, 0xfffffffffffffffa, 0x10001}]}, 0x10) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') 14:05:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x0, 0x4, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') listen(r0, 0x400) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x1f, &(0x7f0000000140)=""/254) writev(r0, &(0x7f0000000080), 0x100002b1) recvmsg(r0, &(0x7f0000002840)={&(0x7f0000000040), 0x80, &(0x7f0000001780)=[{&(0x7f0000000240)=""/51, 0x33}, {&(0x7f0000000280)=""/72, 0x48}, {&(0x7f0000000400)=""/175, 0xaf}, {&(0x7f00000004c0)=""/206, 0xce}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/142, 0x8e}, {&(0x7f0000001680)=""/156, 0x9c}, {&(0x7f0000000300)=""/127, 0x7f}, {&(0x7f0000001740)=""/31, 0x1f}], 0x9, &(0x7f0000001840)=""/4096, 0x1000}, 0x22) 14:05:05 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 173.588797] tmpfs: No value for mount option 'ev/loop#' 14:05:05 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x0, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x0, 0x4, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000000080)={&(0x7f0000000140)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000200)=[{}, {&(0x7f0000001400)="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", 0x100b}, {&(0x7f0000000040)="0ff7df249e5e217e462ad0fb0c426126dceda6a28997178eb8374bf62438f5fe36645ee5e2c4dc", 0x27}, {&(0x7f0000000080)="2f51b43b43361b8326342d278755b5ac39196cc5553b575b26276643c822a8eeeba6d532df2cbe0b0f", 0x29}, {&(0x7f0000000140)="da0ee4924806760f12dd6b89f43aa8f1d42d20ca6673c74d49db92d45381b2a3eca6a007", 0x24}], 0x5) 14:05:05 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r4, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x0, 0x4, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x10) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000140)={r0, 0x0, 0x1000, 0x5, 0x6}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002080)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000002180)=0xe8) sendmmsg(r0, &(0x7f00000023c0)=[{{&(0x7f0000000400)=@rc={0x1f, {0x2, 0x6, 0x4, 0xfffffffffffffffe, 0x69, 0x1}, 0xfffffffffffffff7}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000480)="09ceaa8157608f81f74ee81e61c7b2cd83f08bf8822fbc82bd42b573a78e4312aeb66719df99fdafc3dc0ad6da30cb0456346fd2ae7f83aea43a31bb0f9486c9d8cf6646fdecaa29c47b493f58ccab973bd2b802f5b593", 0x57}, {&(0x7f0000000500)="d71d0f38a80b13626f986ea5a0f3360afd4bdf107096e5ab7601cf9deb4358402115dc17de532a429ad33e6e97360402963aaa0a813926b00bc77e5d0370920cc4a55bb3134263990bd8a2003c59e6680a74c54103e90068704a61d0fefd914e6522252ab5c3aefa732aa7106450a5a0683b4ecc1f43dc0524c43037a8e37237f6402360eff4905ea6c999b8aefb31cd157c44f1158e5c1910c108f93c4e8c7ed8a9351a1206fce0edde315052e95895b8b13c", 0xb3}, {&(0x7f00000005c0)="13b1a415e567f64b921d8aaa5208a9fb03ea9fa284507344fb492c43f6892a34da2d953e39347a1440de19919200247396e2e215cac6d80ce647931a3ff78f16ac437762098cd67dfd8f34f900f142bf9ce357c2f66f6457fac7fcf1923b9254c78fda5e29b2103d3be1652b96eec51f38deda0d5d6ae9bd43f1f2c59552f95b46d4f6ff5920ccf130a2bfef80ba69dcdfcb2664a56c6f1f42258b9f0f23c0c84cef3ff25efe9eb756c91d81c696b8432fdcc238e4a02539d89dcc5a3357a520f650312c79549d93b99b9583a077e7ee56e8caa1e84bb52a61aa10b1e4daeb998d28c50125dcb718ae2595d0a97f", 0xee}], 0x3, &(0x7f00000006c0)=[{0x50, 0x110, 0x7, "a058d745e9036481715b1f34e90d0e0a5fa7c54bffb8cf941528e52dfd2e0337214a123920f5a3935d942f580d240f9b74258da8a6a358c1d6de863d4bfaa764"}, {0x58, 0x103, 0x4, "1dd45648c405404f7424b74f99e456c5cfc3980dcdcbe6ad95c1b3bfc5af28dcd9f2b2f12299af3aa380d64d400b2fa8baf72761d31a45b8405b62f31c54a8b1888de0198ef7"}], 0xa8}, 0x5c7}, {{&(0x7f0000000780)=@llc={0x1a, 0x1b, 0x5, 0x7, 0x4, 0x1, @random="9ad7b82fd42b"}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000800)="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", 0xff}, {&(0x7f0000000900)="f6ce0bd6d56a0cf663051ab061a73d2db6277fabeb5856657cc9b33bfcbf8d286f6cbf47fb6b6cf0a559907d906701bc44554056faf7fe8fdac4c554b46e0cfe6dc1c55f8f25c1693e728a5f66a1188b679e3a60f1caf099abe37fed494dd5ead7bb33961c28aeffe92f04256e09163f2a43fae6255bd3e5c48895419215b8731976ab5c20979bbbda194b82d304f6026386f5c138e55a0cc103c120f48062ff1819d8e54c8b4374e85b1466ac57344eabb865b7d8fcc476f761b152d834e9e7d70da0a33abe6151570ee4fab9378a0688dfeb81d9d44e64", 0xd8}, {&(0x7f0000000a00)="f31f3a6ce30684bb0554aa88a1f2455491d2972af34025ffb4a34783161fda71d2bd8c914d2ecd373596c9c59b1764df4c777ca02a8731728bad23aa18260bbf12d8c27a57736f67da0ede74ab0e2d51401b164d849d1c6d1962163e979dc14c7c82daf86e35276dfc824d9bad27a8e0df8d929dde18b15c9d17bef9ec25c5", 0x7f}, {&(0x7f0000000a80)="5876dadf7c9bcd971e67df3e897554bd2ecb4fe48a64a5a8c7f9118f0c9fa036f9acac8f01838708d56a714673d1942e4e5dee9969e211543ce6cd54db824de408a377bbfde1076ea2b57b53caaceabc07ba52d77bde5b735524414b947480", 0x5f}, {&(0x7f0000000b00)="e2c5f166d99c67d8826950a811dfe9a34fe14f524ca5686fb49bb40431d80d757c2ba09802240fd60acd6d2357b5ab12e563148b5d456310715b3abdc2b8123983b132b1fdc04aaacf9f8b85a88ca12c7ca3bfced5a0448d75eae2c409b36f690cf07b62a036b84b18b893edae8413642c8b4bbaa85ae36873e2cba9a1a60916230f2c08660294df533aabe6cc4003221810a90a77fb6e3c23b3816d6b5e1d6b93ad2388320724b55df2407681c99c862d015e288625ee84e3a8f2c471134b563bbba3d1601015b89f6a208a2f0738b5f102cf587e7f076544360cc785023a4ccbb05ec97236", 0xe6}, {&(0x7f0000000c00)="3fdf3be9eefd940a16f65dd3d15e3b615ed2b8f63792f2920d0a12fb8421540d7150bae3", 0x24}, {&(0x7f0000000c40)="1126bfd78c356f4c9c0bff923a27985cbdc68dab72e340244acee637d836ce10d9022061d1e87f1c980e8e8e17d718aa2afe3cfad7e889d7f8cc6fa16a19ec60e43c16e98af984c0a13051dd5ddc75890489446208940196e484cedc7e403d75f1ebdcfc3b74841d355d37870ce9f1f76b", 0x71}], 0x7, &(0x7f0000000d40)=[{0x90, 0x101, 0x0, "39d0fc56480fe0acae86aafe2eac7ea459d15150e547dea041c009548792cee5e7ff47f3c520ae3555b23cdb68b2524e4443f3f99c683937659a999211fa32e08761cff35729bc34764fad5560b79c0c0900a7eb186fccdacc1ab58ced16ec5418a019657d0cfce1303002cce960019a4164d77387b2c3f4f2393e7a"}, {0xc0, 0x196, 0x2, "bac37d32e41a10f0f1dc36ad0012a947e0619fe0930fdc93c0888486f527a99e00afc90d792550341be0d945cbd6e428cf749efa6f63bb784a1e926a82a6dd986d2d0dcb238d41ef8b9cffce26d5a3f085f1d1072af2d862bd4780c56b53db90077003b632998900b48bb5b9a19184de204a4b8feaa2808e3db7fbd65b7f3ca496726254e09575f8158e7254ad88fa0ca0f658554a89b4540b46864df40fb31c7fe5ce36f3374c9c8154510c386e27"}, {0x20, 0x11f, 0x9, "931bce0d7b5ebb9bd9e99d84df1f5f8f"}, {0x38, 0x10f, 0x5, "e7c749083e680d5a814b718334c788053f0405e68ef40c60e2cb36c792d8d2b038e9"}, {0x50, 0x11e, 0x5, "9d79eed2c0d07b1c9c04a43ff8299227afd06a28c6e8c6e317a0d66296fbd5503754f01bd51655ee4d596039231874e35cc233b8fa2eafff59411bb1b0dc"}, {0x50, 0x0, 0x80000000, "7448247a8c0d10f5e5ad2f25f43d6d122984138955a43e8cf8fe4e7348954d8419d06136839b8fbcc1f355c79f66e39e79309766566225d5987a148d"}, {0x68, 0x11f, 0x3, "90c471840625b7fa869b67123181cf8ad63872bbb0817bb3bac213cadcbeca42f7146a62356a0bd5282df6624ac8591421c695666275a029c5b2bb37d4a9e5f3ccefff0b3d457354d19380ebddae617bfdfe74c32888"}, {0x48, 0x115, 0x80000000, "3a94b642c1f7a75fae260f2ac12e410ce79e847c092fe09f90cc9b906e96c6362349107dd17d53a1b148f8d17d401f9c45f4e19d53d02d"}, {0x1010, 0x11f, 0x8001, "fa7b87f0e86b0e8628ab346c2aea2c6891d6b4bee741eb3c729b99c165344c643901b03a0e239e2d8d90c4d5d17defbd459b0edc9a653597fffd3d550e73d54dec410fc86765a1eac2c9659ad54659f27bb6f8c1e4cbb330e8419aeb6de96240c27b11d0152c33b4f775d72ce1ec5efe2559b2463addb2c8792cb437ae4c43c2c85692786bd47bf38aad81f9f578a8bc341a459fb4945e6b2bd8c5ca81bf3baad1c646fd937bc7fca002969bbddd86e88b3163fb558bb11bf3a8f7bf469412985d95ba57f1e420a91c28358238314d083710cf7faa0585529f026d91f867ea7b78796a20708df556f5ec9fb364d3c4d77ec1741088126206648efd1f05612bafd89dfe6adcc2d28354d732940d2e388f2631421ac9bb1b476f0b225253969a71a35251f35b6130bdfd4317b65e6ad98c5d6393d7eade8ec6f47657a7ec7154515341705e13ee56516d16532ca367d30e7005b6f325299959e4f17965f317620ba358c71d3a71848c4c77c3b427e13187ba4f8922c5fbd963d9ecb3453f0b7171877afef0d233dc013cc1c202bbc71da4f94bf122342dc7d1bb2a1465986fa940228a7d6b754c0e73f84b2221ead1f61abcd3b59d8e57ed4b02c5b990215945981a0c00edd28efd6dcc7424aa7909a8dc741c5ffc4f064e82df86330aaa6527b0520069e3a1709bebb515a39757aa232250215f5eec5f8d01943b5ff384f853afb42c23f00e8787262fece15ae4013d6b1923567564c4f90c170b1af48cb58ee7b6355c04480ac703e6f3882b8133352a3e3fe2bf89229753070dc0e933b20b8ad555341018097ad4bbd513ab781afd7fcc8a56aa2b583f289d742f750451c3ce89f8f59e5e33afc104185ea34f2080f3e15716ae5f25aef727e63929e974466b886a899745642867f49dc184c32ec9b60d9657985608cbdbff7a17d076911409e608145887d6178a9a20c4eaacf16124f61b4b6137287df7b59237900b4d11b995cda4cbc9c20be5c1daf29b7c7f576af2cc523bcb8557779a81acd2f7bdcc71320794cbd1cbf9d9306080298353215ccb989f1e7700dbc6c47adf25579255f5e8971ff2dab45c2d032ad61dd10be0dee11827797bbfa37ace26ab27eff7999b01d37b4859846e16344c8d5225d9bdc6f785b50609ce5c6606538580936bafada3a95f534c7e788c40a6c025bcf789894c4966bd237b10df63b8f4190ca3c9d61ccbf5326dfedb9400cf093da43de0e900cc12be5a7a7a1fcd276ab13aea912345324a720f90e3ab3a3f9d9793c301a3cf1b427375d42b1ddd4c45aef517801df77ef56a87ac5938f152a6bb38499f850e9cfb3982212ffc7b1486b7010efd047dbd3985d2bbb4c96f78475f723cd4cc081fef6ac6a325e4d1741f31a7eef1dfe4f0bc256ea78694395c8468991462c5bd2429c9f8989cb40344c618982c9344e64803156b8673d412e79ccaf64dac12c99d34ae49c8ff5ef3bdbaf77716a3faebe105fa07782c6feff2d1253098d30eb760d0ca4ea8074d9c685738b84d8a10c661695776a4ba117ca9eadc2bb78dffcf03074cb3d9800cc7a09a451e0fa73eb56f397444aaa13fcb4412d91a490fe2fa734059f7670af3a01bc495f23324971e5cd15bc9217d60135552ece47014d06228f1d494a6e4eab9fa28d1499e4ed6f9032c5a7df0a8e6f2f0f7bec8f3974da74e2920c3c7d5f6ad21c8ab0cfb18297d033b5a6d32e33415d9b8d6d78101de5c946c98ab80b2dcb0a8a231d4b8a85c3692b635cfef0b198293f9e35f70a5ff753b89132d3983850e502dfaf9ae1d49cdd17db19f102237d5c72e720af9518a5f32aa3a3de87e28674a77a717080742df6e68fe7055adc038e5593777ce8095c73e1dd1805ff0c6f19bc4c8e3fc0905164c2ca196488137ae1d91da8bdaa955a8657fe157526b7e8c5bcf416e81ad7597eff5e1000f0783369dbe6b51feee8856dde8b534e7256f65776c02d0b4e510b675bc9ade657d3f402d6de96eaff91b1cd462db29258883b498d6e658941eb879c17b3e530c3324917a20e4c8d3279a205fc050d58dcf0c9ee60a036291c9b4199d80961f9e5bd5c6b65e6de9ece518f690c295d4e751b05b808af2c069a54711a7067b288e2cec1b4e4036f4d55c777879062b0afa0ce865c841eefae08e9d7d6aa610bf877275d8b50c664399332be5c90bffd2cf0c9d4b5b7f2f8007fece4898b87cf5f2b2eda1aea9e9e4ecd40f61cfd82fa296397f355816002569ad658684638b7806f3292375035edd46c2c62a4015243932fc857c743529071e1e909dab7bea67cb277e652926c58f1b937613cb9d3fa9ff6efa41f1943581f4f9d96a5cd7f02d61571562369d9d9aa4c29c7186400a43e6b31aa798652636f8bfc07c862bd980e337042d9e75029ee593edbb810e2e18d319fac42cc03ef47011dc0a59d405fa76cd9b51b1c0244d7174c32759f778fe2992fbf08a4b50a10d840474c7eb8bb652486406ae6c6f62d43a076f037b9b220c79e6e7441f8ad442ab557ba4d3831cb3e1fed95d8609e2922e36eba68b6ad7947e1f96a16018615cc2b12f20237831b5042277033156b182e65a62b43164fda8ce629643df7da28d480ba11705a81eadb0bc122e3c7671ca6823a00f9791c5fb8c017a506ffd0cfb8f9098a7f1b5355b69d24caae6402358a97ec247e6b8d2e6f38ec8ddd03dce965e73e57cca0d9457c0a7e09a280c03028ac017872d584f1e2848b027ff809aa3a9d8e99d28d652c41e62383872f100df4e6826fc67832beb62c360fce0e4844b5b2bddb1620e3e20574f988297113de3f867baf20e09ed20e63212bdb490d932822a39e4f4d6dd7b69d2295e73ba009b29a0d8d6a314b03ed5fdfddd94c403818db4c9ea42cea855310a610829e85efcddcbb53cf5a911ebbf80e5e360e89bab4647d36b3daa08336a44d6f40f4a054774b941f1b5f86083665fa202f6f1bf56c9f70269305af22a94eab0d67ad452fe04c184a7430fa32b951684541d3656ff68e58e47205619387165b686b6b2964026745aa3a6c48442f9b52dccda67472226f1177bc4dcab85d3953d72c6b529a3a6bf43bdab6ca4ced6f6fff69b4e75b16710457b13a55e42474bbdb485dcc65c6ad319ffc261084f4a9ad76e627a101f6fec13a1e7cf4e526ac7ec86c270ff17c26ff67af00c0eac1b98402db7190636bd63c492e23c6a44354869af5a4e349bcff4b179ee37bc9196106a8f85aab3bf5ba62703af23f8e743039b72e032aa976e4935d7195aa1c14ff53722471e586fd9e7258a41f020de871032a608ae59106f6ea1cbe33bd49b2f5bcf2144b058894be9812c7c6c4aa8e86c0e0e7159c6f95e38fb7d0552676b117c2fd0614e17fe538066582b60c2842a6f730a5effc98435538c1ab1f7eb97570706179e180f59f156957d1bd879886471b85e228be92d7d89a649dfc2847ae769d91cef684272ae47d74866c919548ae9253b6d0d19ddd50820dc0dd8a1eb43c19c2cb192d756ec027b0ab4f8bd72219744bdae85d2b99e3233fa59b9b542e133a4bdc491065d8ba7ebc1888563cf53fb336939bb1b90f7d4eaf1ea315a938de6706930f4f2de74b992d95041fcdaf4ce49dd808589022881a38f86db0e5aaba4007c56647e06c24cfa98e5577af811e878ce34840151d793d934932e10061199cee636e1e1dc3ba85295a1c1b73d6d59b943dc444b812a23c024412dab20a5e54aa3d375da54ad27223d4cada79876738458b8bf4bf4ca09bc5b013c4c82050f53d4f2f9ab0fcc09bfc9c5ba2b55dc2dfb1561a35f831233484b767b5bdfe80673ae50e2e2b2257ff3d6a4d2ed1964984053f14267473333ef1b5809f5af6a0e3d4272c30d81c36450403326101250fa4752df48d2fecb46a521ce393ab6274e631e25f5a8f9abb5aef8d6053f89d71ea56b72ee34ac1dce65962e2c533ac553f1cfb8ae6c82a13c50fd974973a2de4a9af646f7515cb28db8553b59904674cb3cab5791a5f9ee3c228a5ed52e7922982bc3ec567c4075b9c6eba4f4039591521530e83abbbeb49b25bc70fe73454f7b4928356b7db1d1ec2241cc5e534d4ed8e83eed9004a728512770473a15ef2341582ad67d0c489de3ff3c97ed6ef78ead95cb77102f24dbf093fe4b211bd39337b55b824c0a1a7e6dd4a3059a565ab0ab4f40c6b92caa6c945fc5b8c024434cf715e50717dc40eb20fcf9280b3efe969469a2a20841bbc7998b1a7b1b8e1f1fdd199b423b4842d4507e01381ebd68195712e56beea1c45560c4c1f948c29f28e0ad85aa0e22258352ff8eba5b7f27f2b03b95d4b461e3f4f417cb604781de23ea8e5edcd18b428ac1195dd63834b7637b774c881d4d3d5e2d986d4df8ccb2ddb988eb312a4a432c21367c4414170fadc755ef54f3b307e7617a4f7008c35691c4bb4eeb03cbb3939f8d0feecb91002cbfe4791d274af26a63c67282c938471c97b669c477922c28cbe0ae4b5694c19324beaf8e5483cf95987be49312e680df077cc950796207b8b524262c5c272d6d611eec3d642945c2d0037664bcd8c3b46aef2c85113b56ce2db9a1f263e0ca29969ae85ae26b8a670d5d48a6d0a4b5711bec2161edfc0cc484f58c57c79e932f72b20b95ed4b154c941944bc63749996156d7489ca72b4f79dac3a3d5528aba59b8ffe688cc148a47729a360a875e3c033042cd83bfc9416e30f70d456f7ebec612d0122e9524fa6da014c84e74b85b2abcd56945b1c1884044f67a788aff30141d7aee0da23f6f9da1a0d81839dee2e5233c8de89a0d1d54cf8a87bc44288a9829373fd58866cf0e49c2458626d704ac7b62a716e83fd8023b901cc130fad1259430efa6a7180694a563f837ad0b759bee7ab060a94f9885b8320d996a878d2f43764030b3716a3de7194249fa277a8b68a5358bb15fa31e512d0d4b80a269c9ca9ddbc8ab864a8f59d01dc0752040c82c07065672a096d6649f53615c7336307e664319112d7fc578240ad739a31cbe5ce34589f07c98221371fdf12be2545e656332eb675df48576264fb629874a2ba80971644ccac68a07051ae9fa60b7829d5a63419f6c32ea2fe8b8b627516c906fc6f3d6b2c279f25dc396b415065ddc49138453520727949c549af6927d7d4afc681bc03ffa748f869d56900aa909f69e8077d3f6c95c5ec1758f0fda2657338e17045899a102d0942735c8d19d0ebc2133f48bface22b189106f998c6ed669b44753845ae9ea29fc79a539a8a7d7eafae3b9fb9117c5b03aaf4289ced393d8d432268cfbecbb530ed5f60b6a0ce378d30a77aa3ad805ef75794990cff27be53066e554fb7e12f88a4e85870c9e628cb314ec4e936c0a1e84bdd081d95a63adfd037dd9498ca8c207eae9cd5a00793e9d20c9981e5ca9a85979bdbb7d672903413db456a0d430c02f955c8dc2cc20a3ca3db7982ce34bac5e9172253541826654a37933126bb47242e55522af6a5897b11925c888078bbb969999ddfdbe77b4a391a03b7ea170f2684029ed714cd7363ae2e0d7e4ba31e719bca7ddee46ac3a395c04379d48379d55decafe8e88fc6a03a045998d840eb2f55c65aa813cc7cb918a89a65d731e67a80388ea98bc72e3d4925505c3ba778bcad491df189b8d0b1778cc4408be7c953ac26b96a2596bcd101407aee3baeb0525446c1cd26ea95edb8a116fea02da417f924a8a9ba1181026100d9c6cf202c86c72863282822a50f76375959e3bf1b25092573b196679b7144d44215aa3ca8fe"}], 0x1308}}, {{&(0x7f00000021c0)=@ll={0x11, 0x1d, r1, 0x1, 0xc8, 0x6, @remote}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002240)="9b04bb202ce986b71f0dc97cc8a5092213ca64dcc9ed5bc18a58b069326452039af2d848ac5c0521cdd17e67d07897336f728b7f64374cb688f3fb", 0x3b}], 0x1, &(0x7f00000022c0)=[{0x100, 0x0, 0x0, "5c939949cada3a3d03257760e84e24ffb195c310777086bf7765c868c008aa0df0910df15edebbd7517aacc330a1b6816077f5bf06284f03849fe291164ac8812821b8b9f5cc31d550d4e0ac9d235bd098cf9e4147ca14ff69b8f2c5b1d4db9e11ada82c0160c3e1cb46351ef3bc6f9620adc5789a46876472c0f3201bc3eda6a6d2534b16f16bd53ec3c61a31c160ead3f5df93aca301e1606c965d1559ee0d84d7eec5b8ce7430da0e0741ee78530d9cc615a8671f1ddffe3edd925c4626020804761a71f279642c24e7e1c33ec290c097f044a61061709643917801b26af4eeab5d6449eb172eec"}], 0x100}, 0x7}], 0x3, 0x80) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) ptrace$getregset(0x4204, r2, 0x7, &(0x7f0000000300)={&(0x7f0000000040)=""/91, 0xfffffffffffffd61}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x24}, 0x5, 0x2, 0x0, 0xe, 0x2, 0xc81f}, &(0x7f00000001c0)=0x20) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$BLKRAGET(r3, 0x1263, &(0x7f0000002480)) writev(r0, &(0x7f0000000140), 0x0) 14:05:05 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)}, {&(0x7f0000000140)="570cc783fa292c81e2b6de4d1a57117577385256611cd4ca582abbec2aefc1e642c138ed809d", 0x26}], 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) writev(r1, &(0x7f0000000080), 0x1a6) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) [ 173.776389] tmpfs: No value for mount option 'ev/loop#' 14:05:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r4, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x0, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0x0, 0x2, 0x100000000000001}, 0x20) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0x2}, 0x20) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000140)=0x1e) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000040), 0x0) 14:05:05 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:05 executing program 2: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000080)='\xb7\xbd!\xe3\xcd\x1aE-h\xae\xed\xaf\x04~') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r2 = fcntl$getown(r1, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) rt_tgsigqueueinfo(r2, r3, 0x1, &(0x7f0000000140)={0x3, 0x5, 0x101}) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000000)) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f00000000c0)=@buf) writev(r1, &(0x7f0000000000), 0x0) 14:05:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r3, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r4, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) [ 173.923928] tmpfs: No value for mount option 'ev/loop#' 14:05:05 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x0, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, 0x0) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x400, &(0x7f0000000100)={&(0x7f0000000000)=""/126, 0x1bd}) r1 = getpid() preadv(r0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/143, 0x8f}, {&(0x7f0000000200)=""/200, 0xc8}, {&(0x7f0000000300)=""/108, 0x6c}, {&(0x7f0000000380)=""/238, 0xee}, {&(0x7f0000000480)=""/152, 0x98}, {&(0x7f0000000540)}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/63, 0x3f}, {&(0x7f00000015c0)=""/137, 0x89}], 0x9, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x0, r1}) writev(r0, &(0x7f0000000080), 0x1a6) socket$inet(0x2, 0x0, 0x8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001740)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000001900)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x48010000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001780)={0x12c, r2, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3e2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa812}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfd}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc4}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe000000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x24000000}, 0x20000000) 14:05:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101082) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000100)=[{{}, 0x1, 0x20, 0x2}], 0x103d4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r2, &(0x7f0000000080), 0x1a6) 14:05:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x0, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 174.075177] tmpfs: No value for mount option 'ev/loop#' 14:05:06 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x0, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:06 executing program 5: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:06 executing program 5: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:06 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) epoll_pwait(r3, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xd236ba64}) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x56}, 0x7) exit_group(0x6) writev(r3, &(0x7f0000000080), 0x1a6) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x100000001) 14:05:06 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x0, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 174.212111] tmpfs: No value for mount option 'ev/loop#' 14:05:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) recvfrom$inet6(r0, &(0x7f0000000000)=""/156, 0x9c, 0x1, &(0x7f0000000140)={0xa, 0x4e22, 0xb491, @remote, 0x2}, 0x1c) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:06 executing program 5: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) 14:05:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, 0x0}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgrp(0x0) r6 = geteuid() stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000400)={0x2e0, 0x2a, 0x2, 0x70bd28, 0x25dfdbfd, "", [@nested={0x2c4, 0x5d, [@typed={0xc, 0x0, @str='comm\x00'}, @typed={0x8, 0x4a, @pid=r1}, @typed={0xc, 0x83, @u64=0x4}, @generic="567c529e916fedd39ce7f7a7a4f7200e", @typed={0x8, 0x13, @uid=r2}, @generic="f2072be99833658e9f2816822eef3e0b840505f5856e48a7187bad73cbd53980522d0c5574d42a2b32dcc487bbbb9e1894f934c740ffb4b20ce8882bf9672ede98de9de29addf6decf68b113c1a093f54d393e246f3ccb3d219f341219d17daae9344ed2cf24755b1d8a5a99820523084f8c3096a06e0654e0dd1189d152f3996e09170e62a5055f59b932f86dadfb4259037f1499546c0be8bfe997a8ae2837b0b9851532de8bc6df15825436aba4dac6871a1c8084be805b4a8113219e1abab201cec1ca67d83927bc242f833e8a6f7409f70f", @typed={0x100, 0x5d, @binary="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"}, @generic="3af85626026f246bffc6e6116cd3e0eb81880b1cfb0a6ccf78b539d4417fa90dae4df77af4584d99911d1b05b9d0e9811d8c7884e0763d98cc9aa39b5b4c9c67f82a946080b078bd97308ff4b20840e0b9de3870906c3ce32e1589a26d65db73e81c3140a56b3440fbb5ad074c172bd42446392ececc8c12f20d8feff71b32ae58c542fe344511c365499b3619e60bfafec070ad23d7d8d51af393185d4b61afdcfbc5fd51cf9e1f6c61bf8b17e910e9ec"]}, @typed={0xc, 0x4, @str='comm\x00'}]}, 0x2e0}, {&(0x7f0000000700)={0x314, 0x38, 0x400, 0x70bd26, 0x25dfdbfe, "", [@typed={0x8, 0x0, @fd=r0}, @generic="b4296e4749cb0cd8fe49758377347f585f2ada9c679feec9393b89d4f7b98954a1226914aabc49ce36471ee8f3988006ee38045333f2fa2cbc789330b042cdb58f82025641ffb35702fd4459f1d1407b72691916db9c600451fda2bca63237e144fe633373dcc31871ccea37b504d58aa78820b4d83db0d00553f8b4e4073150efc4e9bc8a52d27fa488b513ea58c0e378456f6935744e315615f7be8fa2b2463f3e0d739e163b96ad244df1ff2c084440f91c949dad8b31a8670491216eadc8f8a1b84608ae13c0dd018e7d0fc244bd2e6cd5cc08df", @nested={0x224, 0x10, [@typed={0x8, 0x76, @pid=r3}, @generic="45038393c24ce0443bf07d006d90385c418408119156ca00f8f347ce41bece2c56176e096945681fdece47e6422c6ffa185133f036dc891474848611b9b39a4f05fc504b3b1d47392443a15dcadf97fe9329b160ec514ac351a82454b25671458fa363498051708abd01d4b6a0ca6324", @typed={0x8, 0x3c, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @generic="73faf6a64e07c6451090bb87dc03d1e0119d2067792291ccd17b8d52d5ac8edeb00d7c0a638a6eef4437b374a170426f18efde0bd9b00ffa63d7fea54ee15280dc8101d729ac894fb6cb1262463c02b2dbe9ab27b642e87613ee34c61dbfbdb42e78fd2a2282d354f6c1b296bfacb70f714835616ad40c5e5c1ce994565349da52d5768dc8b1368a2b0e7e9182bc8d6812c9531b602450b98de6b8ee8d1cc851c892663ba37d5943402758f68fdf74503e9dd6b525e1b764", @typed={0x8, 0x78, @uid=r4}, @typed={0x8, 0x60, @str=':\x00'}, @generic="eea8ac40275d4ec2f99f3c5167a2adbf04c9a50a1560ff913c31021290fd4e44a8f97d60455e6d53c74f7c6c551759e894b7d9debe6233fbfa81f9c071cd094fb78c469f95a11f22bebb224523d378d1acc77ece5a237695213f26cef39635553048a37a515dee423f4c8dd212d4a3e8dc04e5270b8309228c02e93920bc1f0b172a443303caae95e44194bbf5b876e9d907187d98a6be6d9357f621864dd6aa554e4e6955b08642d509eb47f5", @typed={0x8, 0x51, @ipv4=@empty}, @generic="665fc2bcd4768222a42b3a310b6a0b6169d3647a6be7466c9dde0d0ff7ff3b07ac"]}]}, 0x314}, {&(0x7f0000000a40)={0x28c, 0x10, 0x800, 0x70bd2d, 0x25dfdbfe, "", [@nested={0x27c, 0x6a, [@generic="5655909a785c3e92ebd4a426d278eea1a087f69f0c9126f654c0710bf22824a87451fba32b00364a544681342acebd6d02e6561821ed165579bda153772fcedc1c7f1b2c1292f8142372d2b95b9a7adeeec3e9547594034ac5a86d54ca4236847fa310c340f94506ebe1af6a361908395fc53a10920262d36de5db8167293abc5922012a58295347facadb43fb0ee80a56d0233227b7750d6636820a4c9668e6c88b14b021f801473b593ac1781a98bd675834bc5ff3e4034e1ff3af8f19d7d65bd3", @generic="3faab5158ece37bdbf24560624dc32204e4adfe652ae3105062a520c860d2121bedb0153b1d34a5f7737dff478a80e64f0deea7ebc8a837308a41c0c011585342e9faaadbd5bed3375f88ed520a8abfa9cadf81fd28c92b4ef41406933ed314289eb69367b18689bd29d74e61228b0c80cb89bfde0ea92ced736a93def4dbfc85c98701e67282b34ff95a66c4967400e63fac3a7b8ee7fa70347bb064b12ac4e15d154b268562c5894e84199e0a2a10072fc5897e830f3132f96687fbe328ed7e27ece29843fc3161f02187abb55fc24d92314b9c7d32bfa885587a0f8f046f0e3daba303aaf54b713143740ec01aad1601fd03bd28f90", @generic="120fc44676fbac80b71623c2dc8c93ffffe1dfdd43f7fa28e4d6d1add94ee7035859d1d2721662e305d49fc9980b0d1ea8eab3447bb579b4fd88a1887d9fadc6a135a5ffebe36edc25e088fdc109c987f63b9fd0a7a79b8d61668233de10d7a133bfe18ab40d646f11738ab9d3fe51cd4e5060322939eee6db8aea1be3e86b55cde7940c4482542e583bedfd9eee0f906248355bca28e8de464e7b18e1965ac1ecfcfce3e09c4cf5e6984cdec1f896a5e742fceb1e3d740b2514247449"]}]}, 0x28c}], 0x3, &(0x7f0000000300)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x38, 0x80}, 0x4000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$setregset(0x4205, r1, 0x4, &(0x7f0000000040)={&(0x7f0000000140)="54f61df45b218d081a4b616e87393a57e71943e7c6c8f97b7e53bc62b2830f18a04bb6cd403064fdd5eda08b0ac832c2d106c3267d84da5dc1aaa6de9735c85d22bf6d1ce3625a784277b9561f31f77172e1d8c789bc862eb91374294098ef1d1c64e0bc71870d6c9614bfb88f9e762bcb859d0240504b9ffd0549460825f96f321d", 0x82}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 14:05:06 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000400)='comm\x00m\x8f]6\x9b{\xebH\xe0\b\xb9\xca\xe7\x0f\x7f/1t|\xf3\xb0\xb4\xa0o\xfe\xf3\xe2\xdeP\xf5@by\xdb\n\xd8\xac\xbc\xf8,\xa9r\xdb\xb6\xbaJ\t\xdf\xca\x14w\xdf.\x0e\x8f_\xfb\xeb\x82\xdd\x0f2=\xbf\x92Q\x19\xc2\xf4\xde\x04F\xa0\x85\xec\xaba)C\xaa4\xd35\xa95\xc6\x92\x87\xfc\xc2\xe6bU\xc0T\xffz\xf3A\xe1\\\v^\x7f\x88M\a\xb1\xc3 \xda\xe0\x81y+\x0f*\r\xe7^\x17\xf5.\xba\xc7\xcc\xf9\xd1\x8e\x8e\x19\xd97\xce\x9c\x12x\xdb\x14\xdb\xd4(!\xc1.\x89g<5\x06a+\x86)\xfa\r7\x88y\"\xf7\xc2\xa9') rt_sigreturn() ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f00000000c0)="747a71bfd8b77b00c8a008b30ea72d27", 0x10}, {&(0x7f0000000240)="5bc30fe466be888e5bacd278958c67777687644be07342c06f78e2dd3603bfd8f473697a7c740f87d15d047c031f644cdcc2c6f84995e871f00d16103ca02092d9b14fb25e549af3f0b8744a92a99f46287861fbdf6f4bfcd5e6876cb2a38598810a1c9e809de80ca4aa3e1466424fc1d8848684774d4d2d9d39e6ffacfb4fba7121c5c81a5aba8b4c1c7af231b78a70330264cddc0b4d0433e5d98a46f63fcbfab6027d2639b77d319a6fa044e93abfe0048df27f4dee8f8d693a3e15720c934fbbea", 0xc3}, {&(0x7f00000004c0)="4f513ccaf46d9f625ad81254c347fdecb37c29192fc72825af50a01b468c425c0e8543c1da5c30d20789595d86f2a2417b0cc990c661376b95c5bc04685aed3628dfb5c9d3189ece2b2760c021ca745e861b1a5e563bc4ec", 0x58}, {&(0x7f0000000340)="832c0c2a5dbe88d5279dc170e73d97", 0xf}, {&(0x7f0000000540)="97a8249cedca728a918c1e11566f4b7e0c4323f0bb2c2196c0fc6f999a6d614de5520f69f94a506c6a5748332aaf907837f1aaf82c92d45b9395e5b0b60510685239fb4830edac6309fc75c17ef24d0179352cedbc2b901bc450a13cb2334d2c9d75d752e634bff830ac7cc06a3a477944fcea9bad001e68b69a7934fe5e4bcfc572043dfd1db6861a016d2de5f4b439372846e0758b4f508c93d5c7560d42fccbaeae", 0xa3}, {&(0x7f0000000600)="8ad2a531bf3c3b5ad6fb634ac0fceaa49eb63ecf00c53cd61a4655b74f446c9d39ef9523fccbd818e7775f2971dd8d84a5a5a1365f8d5646ac49e2e1cc48aeffebdc5a92d7fdb58f9df5272ba0e4b0162896deb5e7e4defa881a85c26c4a1a407599959f5565c6bf575efdfec4b4a056f72f9b06078fd02e27c77fd4e42ba3c9d34fbd59f832f45e7c45b4a4da9ec4a51dc902f7bec0aab213db59ab346b68a574b2929655bea5296f8be4c649831a8df229662861c29d41b9454a0f1d9ddec942a058657033156483008af20fca439fa9098ada4cc2e8e29b", 0xd9}], 0x6) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x200, 0x6}) ioctl(r1, 0x100, &(0x7f0000000140)="f32ea0639e8f7a96ee9794da51b042a317670ab1ea3cc5a9faf91dd74ad5d9795d7fed9cf2a42a06c64f5821e30a356c4b4223aeb215a9e837f259287c03fa2a8c6f4a3c57aa152f73f3e733ff646673b6c1f057c2620097376b2efa6a615fdec8712a44d4378cdbe09fe3ca5c0ac8e65251a3ef35b9f09d352da8589c14ab035843566422bcbeda29a4dad55e8254e714ef3a8c5d347a5b204a4a458fa27135603fad15c57070a6932c9d645eba90f8c7938b03aa694b568fe9970ca4a8de7d4a4515b824df93b039d70e1b302e2da828de42a12d8c0f1bf1f1") writev(r1, &(0x7f0000000080), 0x1a6) 14:05:06 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 14:05:06 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x0, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:06 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x0) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 174.353818] tmpfs: No value for mount option 'ev/loop#' 14:05:06 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='cm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000080), 0x1a6) [ 174.458435] tmpfs: No value for mount option 'ev/loop#' 14:05:07 executing program 1: syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x80000001}, 0x8) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:07 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) epoll_pwait(r3, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xd236ba64}) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x56}, 0x7) exit_group(0x6) writev(r3, &(0x7f0000000080), 0x1a6) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x100000001) 14:05:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 14:05:07 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(0x0, 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:07 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=""/126, 0x7e}) writev(0xffffffffffffffff, &(0x7f0000000080), 0x1a6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f00000000c0)=""/131) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) 14:05:07 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x0, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') r1 = getpid() setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) ptrace$getregset(0x4204, r1, 0x220, &(0x7f0000000100)={&(0x7f0000000080)=""/126, 0x7e}) vmsplice(r0, &(0x7f0000000700)=[{&(0x7f00000001c0)="e556c684a7b771e31ec60d45bebe86a9df7b84a37e6efebdaccf88cfedd1e2fa736073f276d3be6d751b3673630ada0e07bce9014a9246d3981d47d832f323544716fecf131a2339213350e8eab8d2e6defae68840771191173cd6b0158104c748e1b9b827670e48d3c442ed7df6eb1b9170e02ed0c802c235db0dcd71884177f6dd40c3b1e2aa87a04bb913e549786599dd07e0e99219b62dc582a46e062a270aff9044e17e6360dabb5d199c01eec854e6d67e06a6157984de2999c6b2c49e3d8766b7186127e71f00f5e2ccd081929dd6a6", 0xd3}, {&(0x7f0000000040)="832841395eef15e3f9197b5d2f4330b999fb0ec5f8977333ab8276eb0332e50424c9357c31", 0x25}, {&(0x7f00000002c0)="0b4e8cd0fa5e91ded86ff329c493140b2b33255f69f36444e8f33815e402a1e04b8ec32addf22bb7a956a4c5127096b5cb5d78c71dd5a4f9e2d70dc1d104b3946ed7e4f45d740b12c408a49fe16d56b7cd8016f1bddc6749e2805ce1a16dcc4c134b2855b33ca7716e8203f9149d39d10833805c56e2f9c0572c6437a4ff5e0503", 0x81}, {&(0x7f0000000380)="3099bd6f3e2e8dba780f0dc2d3e074fb2686ccd6db19babe8384e012a53217bd3f47dfe85034e9c9988cb703f16a114b264bfd0c78a5ff9210b792bfbff0b03e87f50a204fc34e8dbf9a8f987f37c63df49689cca5df70d94d8cd2cd18928a1844c0e82440c3dc1c53034e03596b2a94e3430b023dd4186d93234babdb6cc8979a94efdd9ab5d6133533f36e99aa4f600133131cac3bbb95f8cbf77a8b69400f31cffa4a7ae1", 0xa6}, {&(0x7f0000000140)="7a60b1e0cecea2d5bff0899aac69ce4a5d5e", 0x12}, {&(0x7f0000000440)="71c8a9c2fcb92bf8edee83c15c9c7cf45c9d40fbc6abfa32fc218057639c8ab2d6dc756494d82d014769265f2c52f5f2c7adf932aba62e1a528cc8026f1ccc7b93f44eccb5b72dcd479baa080938140b149aa77a2b0442d74bd593ab0231171af773cb3aa0ef10fd4d0aa66d3db3f8832cfe467fbff17a6870c079ae0dbccb3a4cca044eb30b554c6a42808ead7edb5160916d58bd0de2859f5b5a3122d10f75140601a6783353462b29ec32d64a32b1", 0xb0}, {&(0x7f0000000500)="2e5201da6d895fc1c20a792b636abbd8c5c26e63189075863025397330529e16a13b05571e94ffadfbe5b70dd732b51719953b03cb3cb077c49b780d293fe7b69bf47d73bc1a9c5b275e59cb5b2bfee505788a84a8726165be910acea59b74fa8ec6218260751fe2874267eb09c456fbd2da9e1aed5bc1b495638ed0b01240d0daa97dcb65172c6bc73f78e1b91ca4a024e955fcd3e065fc5eb73a7a4443b0c9f3c6988f3b8f199f5d9c7810f8ff710fb28df00ce7762c43e963d0b12d0cb450338383706cdeee7773ba50fe21d9e03aedf02d737d61855eb38015ef4c96a2acfd0e0a37ba830f41de93b1d78cf7902a2bc7fc3c7040176b", 0xf8}, {&(0x7f0000000600)="b284713b8dcd7d544c0d04aeaecd447b7d4a6faedad817a335c43721eb79c6fce33caf9006d5d23b1463aaa02d19efe529236fd99421c18bc9a5ab539a3d9465efd315274ca0e53a1a73a5893d4a92b30b984183a79ebf344150d86ea0a92bb7c5f5ef0e41f008b55f9c160685b0696c76973d3509ea6c61d65873aa52d6f5dc123a6ac58a0fee86dad582538cab10eff710c0440fca25235e0ad129a6cb791f46af5bf16490ad840265a12bc25baae6ebeb0ced72c6acf1917c2913dafbfa196c6c95406dd55e87220908f784a686ee83880a8219e40bb085b7d5044da3c6b043c5ced212e6941f48c6092987cdd04c918240e56f62", 0xf6}], 0x8, 0x1) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x6, 0x100000001, 0x3, 0x0, 0x3}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=""/126, 0x7e}) recvfrom$inet(r0, &(0x7f0000000000)=""/120, 0x78, 0x101, 0x0, 0x0) writev(r0, &(0x7f0000000080), 0x1a6) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000100)) 14:05:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) [ 175.100757] tmpfs: No value for mount option 'ev/loop#' 14:05:07 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, 0x0, 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:07 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x0, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x0, 0x4, 0x0, &(0x7f0000000800)}) 14:05:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) [ 175.266545] tmpfs: No value for mount option 'ev/loop#' 14:05:07 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) epoll_pwait(r3, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xd236ba64}) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x56}, 0x7) exit_group(0x6) writev(r3, &(0x7f0000000080), 0x1a6) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x100000001) 14:05:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r1 = getpgid(0xffffffffffffffff) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:07 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(0x0, 0x4000) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x0, 0x4, 0x0, &(0x7f0000000800)}) 14:05:07 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x0, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0xe, &(0x7f0000000000)='nodev^{,nodev\x00'}, 0x30) ptrace$getregset(0x4204, r1, 0x201, &(0x7f0000000080)={&(0x7f0000000140)=""/156, 0x9c}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x0, 0x4, 0x0, &(0x7f0000000800)}) 14:05:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0xb9}) writev(r0, &(0x7f0000000000), 0x100004a1) 14:05:07 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x0, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:07 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) epoll_pwait(r3, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xd236ba64}) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x56}, 0x7) exit_group(0x6) writev(r3, &(0x7f0000000080), 0x1a6) [ 175.953494] tmpfs: No value for mount option 'ev/loop#' 14:05:07 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:07 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 14:05:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = gettid() ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000140)) capget(&(0x7f0000000040)={0x20080522, r1}, &(0x7f0000000080)={0x2, 0x4, 0x6, 0x5, 0x400, 0x4}) writev(r0, &(0x7f0000000080), 0x1a6) fdatasync(r0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000000)) 14:05:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100), 0x4000) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) [ 176.068143] tmpfs: No value for mount option 'ev/loop#' 14:05:08 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x0, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$getregset(0x4204, r1, 0x6, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x15}) writev(r0, &(0x7f0000000080), 0x1a6) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) sendto$unix(r0, &(0x7f0000000400)="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", 0x1000, 0x4000, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) 14:05:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:08 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r1 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x800) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x40280, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x18314af529ed1bd4, 0x0) r2 = dup3(r0, r1, 0x80000) r3 = openat$cgroup_type(r2, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) r4 = fcntl$getown(r3, 0x9) syz_open_procfs(r4, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80000) writev(r5, &(0x7f0000000140), 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) 14:05:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:08 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) [ 176.210570] tmpfs: No value for mount option 'ev/loop#' 14:05:08 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) epoll_pwait(r3, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xd236ba64}) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x56}, 0x7) writev(r3, &(0x7f0000000080), 0x1a6) 14:05:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) prctl$PR_CAP_AMBIENT(0x2f, 0x1, 0x11) writev(r0, &(0x7f0000000080), 0x1a6) clock_getres(0x0, &(0x7f0000000000)) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) 14:05:08 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0x0, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_mr_vif\x00') r1 = geteuid() getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) write$P9_RGETATTR(r0, &(0x7f0000000200)={0xa0, 0x19, 0x1, {0x0, {0xd0, 0x0, 0x4}, 0x0, r1, r2, 0xbe98, 0xa832, 0xb96, 0xffff, 0x7, 0x3, 0x1, 0x8, 0x8, 0x0, 0x80000000, 0x9, 0x6, 0x3, 0x5}}, 0xa0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/mcfilter6\x00') openat$cgroup_ro(r3, &(0x7f0000000040)='rdma.current\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r4, &(0x7f0000000080), 0x1a6) 14:05:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x0, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:08 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101082) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000100)=[{{}, 0x1, 0x20, 0x2}], 0x103d4) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r2, &(0x7f0000000080), 0x1a6) 14:05:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='ooDj\x00\x11\n\x95Y<^\xc7Q\x84\x00\xca\xb9\xdd\x9d\x98)\x9e\x8cR\x03\xb1\t$\xe7!9\xa7h-\x81\xfd4\xf1w\xdb\xac\x81\x067\xb6\xde\xf7\x11\xa9}^\x8c\x1c\x9c\x9d\xe0\x17i;r\xa5f!\xabrO\xb0\xd6\x84\xf9\x00u\xc9\xe1\xe5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x0, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:08 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:08 executing program 2: r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/snmp6\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0x5, 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa040010}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x806, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x914}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) writev(r1, &(0x7f0000000080), 0x1a6) [ 176.866759] tmpfs: No value for mount option 'ev/loop#' 14:05:08 executing program 1: r0 = socket$unix(0x1, 0x0, 0x0) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="b00455ff5613215ad3d84e3ef2fb97f6db47fc4a9e8cc828464bf6e9dc88a6248ece596f0d9945eee51bdea9cb38af64c1e34b2e4d2b17096591b33ca743d9156a7d4795281fd659466214abfb2522f02db31194913e1c540bc921c601bf24fca01e4fe1b72b1cbd10e963c0c8cefff0b95a67ee9f205e48081eecc51ae9c744b7fda78739417ece85150e6cadfc1e7723984ac2eddab7a5dd75d14b482fa586f7092c36c19cddad1b6198f8e0c56790e4f0e39656efec1cf8aea391edfffa43b5fa86c2286f13f49067481dadcca6cad15f74798219584b", 0xd8}, {&(0x7f0000000000)="08368e589d63b53375593f9b7d5d6d10f751241162df197a538b7e3c72a35afc22a2324782d7a001c9a652e8373b28433bd22acd8667ec48787f1f46bda2b4951d70ffb1e4a938104a92642e8d35ceda04a1c64a88c19525597a60d4ba07a5bff61e13c7db5ce667ffd0af908647e77b287e11ebfcc4b6782ab7dfc0481f16a5b6cbd63218aae012125268ddb7bc75969191f1a90d8749739226e95201d9e5163195c5859b6b933779", 0xa9}], 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000440)=0x0) ptrace$getregset(0x4204, r2, 0x20000000000006, &(0x7f0000000400)={&(0x7f00000002c0)=""/141, 0xfe91}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=""/126, 0x7e}) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000100)) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:08 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 177.096719] tmpfs: No value for mount option 'ev/loop#' 14:05:11 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) epoll_pwait(r3, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xd236ba64}) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x56}, 0x7) writev(r3, &(0x7f0000000080), 0x1a6) 14:05:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:11 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x8000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:11 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x49, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}]}}, 0x49) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:11 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x0, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:11 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:11 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x0, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000000), 0xffffffffffffde1) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) syncfs(r0) 14:05:11 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:11 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r2, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) [ 179.921515] tmpfs: No value for mount option 'ev/loop#' 14:05:11 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 180.044089] tmpfs: No value for mount option 'ev/loop#' 14:05:12 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) 14:05:14 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) epoll_pwait(r3, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xd236ba64}) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x56}, 0x7) writev(r3, &(0x7f0000000080), 0x1a6) 14:05:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000140)) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:14 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x0, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) 14:05:14 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:14 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x0, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') r1 = getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000100)) r2 = getpgid(r1) ptrace$getregset(0x4204, r2, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x7e}) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:14 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:14 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x0, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 182.953101] tmpfs: No value for mount option 'ev/loop#' 14:05:15 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='comm\x00') setsockopt(r0, 0x75, 0x100, &(0x7f0000000000)="dd59f3dba914ca90eccb8d9f87d86a7216ad3694", 0x14) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) [ 183.113586] tmpfs: No value for mount option 'ev/loop#' 14:05:17 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = gettid() r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x3) epoll_pwait(r3, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=""/126, 0xd236ba64}) exit_group(0x6) writev(r3, &(0x7f0000000080), 0x1a6) 14:05:17 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x49, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x49) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:17 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000240)="f5e41dbd42194ed5b5d9be739c925e972b416a442b4d5d9e98c6b2edf3be6884edbceb12b8a5c5a36e84594837f985be096f9c65dad54775a63f2e7f6d61be6235865f8e78241d6a99140865d271a69375d25e05a7b8d07bfc4e93e115cc7afc5924ca6bb9bac5e7062aa3682a473f31f0ada00a4cb036d273b1f0bbb80500000000000000fdc8ce866433e7c15688c9b7160ad9acca7e2cbbf3f0a774de572425867f4baa1ea080822c97124c7ebb1be117ca564b720513b2a5fcd138b014ef31b2e94e3b38fc2b3fc5cb4b6ae094"}, {&(0x7f0000000080)="992a08cc159c26b26727da7ed2e6bad92180b79b0209a3cfd24ea427b2ee"}], 0x10000000000000ea) 14:05:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:17 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:17 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x0, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e24, @multicast2}, {0x306, @random="13aa24b0aa86"}, 0x1c, {0x2, 0x4e21, @empty}, 'veth0_to_bond\x00'}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) socket$nl_netfilter(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000080), 0x1a6) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) 14:05:17 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x49, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x0, 0x0, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x49) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 185.974512] tmpfs: No value for mount option 'ev/loop#' 14:05:17 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x49, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x49) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:18 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x40001) pwrite64(r0, &(0x7f0000000400)="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", 0x1000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) writev(r1, &(0x7f0000000040), 0x100000000000002d) [ 186.121838] tmpfs: No value for mount option 'ev/loop#' 14:05:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:18 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) gettid() r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x3) epoll_pwait(r2, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000180)={0x10000, 0x6}) exit_group(0x6) writev(r2, &(0x7f0000000080), 0x1a6) 14:05:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x0, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:18 executing program 1: r0 = getpid() ptrace$getregset(0x4204, r0, 0x5, &(0x7f0000000080)={&(0x7f0000000300)=""/95, 0x5f}) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/packet\x00') ioctl(r1, 0x4, &(0x7f0000000500)="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") ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000200)={0xc223, 0x2}) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x28100202}, 0xc, &(0x7f0000000240)={&(0x7f0000001500)=ANY=[@ANYBLOB="60000000ca15009c730bd1b46ceaf2f317355f83654c41879189b25849da7d21dc05039d93e8cd6ba55fe9216b94194547bf107a095ae8f4730000002a0d2a27156e0cb75a9f2b59b40cb2c0b3f4d1ffe546cff728fff2af5f90ebba42899454c58e19564980a478dfac004765ffc2702ce4d5b2c73e5fd1ce6362473914c9d216aaa4a2bea6caf4680e78a760995c22372d", @ANYRES16=r3, @ANYBLOB="020028bd7000fddbdf25110000004c000900080001accd160c4995142e0005000000080002000000000008000100800000000800020006000000080002000300000008000200570a000008000200030000000800020008000000"], 0x60}, 0x1, 0x0, 0x0, 0x10}, 0x40004) writev(r2, &(0x7f0000000080), 0x1a6) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000002c0)=0x3) 14:05:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x49, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{}, 0x3, 0x0, 0x7, './file0'}]}}, 0x49) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x0, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x49, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x0, 0x0, 0x5}, 0x0, 0x0, 0x7, './file0'}]}}, 0x49) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 186.795052] tmpfs: No value for mount option 'ev/loop#' 14:05:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) fcntl$notify(r0, 0x402, 0x8) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:18 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x0, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:18 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{}, 0x3, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 186.928288] tmpfs: No value for mount option 'ev/loop#' 14:05:19 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) gettid() openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x3) epoll_pwait(r1, &(0x7f0000000080)=[{}, {}], 0x2, 0xab, &(0x7f0000000140)={0x4}, 0x8) exit_group(0x6) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:19 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x0, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:19 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(0x0, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100589edc59aa7be48abc954889dd36997d9e707ecec8f174a4be1b4df1c89db4e9d41ca43de0226a3143b06cde7981b0df3901f6ffdbaa03895bd8d97040abe0946b9ab439da529a5217f1f9d2d719eb3254f48f6b6169e1e0b2f8a12e5da5461e93aee3ab1a29e0e647276f92acbb110fd66debf42165d5f1ea7f8dbbef625fd5b8dcec1bc5398815178f328927d3050649ab1bd5aeb2bd9c3d41c7abb37a96a53edeb9b579925dab168f546bf25f59c71012802896e710b83f0000001ffc388e53c0d5c91001624e8cf0e0af9ba19aa4c831382e1e1ef1b97e2f76d9298c760faaa005312dc45af34a0906b8b520c06a1a50bfe2c766fbae49cf", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) 14:05:19 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:19 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:19 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000140)=""/192, 0xc0}) syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) 14:05:19 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x68, 0x29, 0x1, {0x1, [{{0x20, 0x3, 0x4}, 0x5, 0x7, 0x7, './file0'}, {{0x10, 0x2, 0x8}, 0xfff, 0x9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x3, 0x2, 0x7, './file0'}]}}, 0x68) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 187.656754] tmpfs: No value for mount option 'ev/loop#' 14:05:19 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:19 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 187.911021] tmpfs: No value for mount option 'ev/loop#' 14:05:20 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:05:20 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) gettid() openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x3) exit_group(0x6) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = socket$inet_udp(0x2, 0x2, 0x0) pipe2$9p(&(0x7f00000000c0), 0x80000) ioctl$FICLONE(r1, 0x40049409, r0) r2 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="8875843e44fe58bd6c2f393aa4ea200250afa019b9de9c", 0x17, 0x0) keyctl$set_timeout(0xf, r2, 0x1) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:20 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) 14:05:20 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:05:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x470200, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="f4000000", @ANYRES16=r2, @ANYBLOB="100026bd7000ffdbdf250b0000001c0009000800010005000000080002006e0800000800010005000000c400050008000100657468004c000200080001001d00000008000400070000000800010084720000080001001700000008000400ffff00000800040003000000080002000000000008000300ff01000008000293a4e7000800000008000100696200001c00020008000200050000000800030000000080080001000d00000014000200080001000a00000008000200ff0100000400020008000100756470001c0002000800010007000000080001000c000000080001476cbd2b304337809b94001d0000000c00"], 0xf4}, 0x1, 0x0, 0x0, 0x40000}, 0x40) 14:05:20 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 188.529367] tmpfs: No value for mount option 'ev/loop#' 14:05:20 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000100)=""/154) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'ip_vti0\x00', 0x2}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x4, 0x10001, 0x2, 0x0}) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 14:05:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr(r0, &(0x7f0000000400)=@known='com.apple.FinderInfo\x00', &(0x7f0000000440)='/dev/loop#\x00', 0xb, 0x2) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000100)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0xd4, 0x0, &(0x7f0000000280)=[@release={0x40046306, 0x2}, @transaction={0x40406300, {0x1, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=[0x18]}}, @release={0x40046306, 0x4}, @request_death={0x400c630e, 0x4, 0x1}, @decrefs={0x40046307, 0x4}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x40, 0x38, &(0x7f0000000180)=[@flat={0x77682a85, 0x0, r2, 0x2}, @ptr={0x70742a85, 0x0, &(0x7f0000000140), 0x1, 0x4, 0x6}], &(0x7f0000000240)=[0x78, 0x28, 0x30, 0x28, 0x48, 0x38, 0x28]}}, @request_death={0x400c630e, 0x4, 0x4}, @clear_death={0x400c630f, 0x3, 0x2}, @register_looper], 0x2, 0x0, &(0x7f0000000380)="f92b"}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x4000, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x2) r4 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x81, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r4, 0x1269, &(0x7f00000001c0)={0x1, 0x800, 0x34f, 0x0}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x30) [ 188.635832] tmpfs: No value for mount option 'ev/loop#' 14:05:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) 14:05:20 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, 0x0, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r4 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) [ 188.716721] binder: 8540:8543 Release 1 refcount change on invalid ref 2 ret -22 [ 188.745426] binder: 8540:8543 got transaction to invalid handle [ 188.755741] tmpfs: No value for mount option 'ev/loop#' [ 188.779118] binder: 8540:8543 transaction failed 29201/-22, size 0-8 line 3012 [ 188.806647] binder: 8540:8555 Release 1 refcount change on invalid ref 2 ret -22 [ 188.815350] binder: 8540:8555 got transaction to invalid handle [ 188.821760] binder: 8540:8555 transaction failed 29201/-22, size 0-8 line 3012 14:05:21 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}) 14:05:21 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) gettid() openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') exit_group(0x6) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r2, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) clock_nanosleep(0x7, 0x0, &(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000040)) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) 14:05:21 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendfile(r1, r0, &(0x7f0000000080), 0x100) r2 = getpgid(0xffffffffffffffff) sched_setscheduler(r2, 0x6, &(0x7f00000000c0)=0x6) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e20, @local}}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x10000}, 0x8) 14:05:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x182) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3, 0x40002) write$P9_RSTAT(r1, &(0x7f0000000080)={0x54, 0x7d, 0x2, {0x0, 0x4d, 0x1ff, 0xedd3, {0x8, 0x3, 0x2}, 0x300000, 0x6, 0x400, 0x2, 0x4, ')lo-', 0x2, ':,', 0x9, 'mime_type', 0xb, '/dev/loop#\x00'}}, 0x54) [ 189.364373] tmpfs: No value for mount option 'ev/loop#' 14:05:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) memfd_create(&(0x7f0000000080)='eth0\x00', 0x7) write$P9_RRENAMEAT(r1, &(0x7f0000000140)={0xfffffffffffffe1c, 0x4b, 0x1}, 0xfffffdf3) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000240), &(0x7f0000000100)=0xfffffffffffffdc2) 14:05:21 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0xfffffffffffffff7, 0x5, 0x0, 0x0}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) utimensat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x100) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 14:05:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000006c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x2) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 189.513500] tmpfs: No value for mount option 'ev/loop#' 14:05:21 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100589edc59aa7be48abc954889dd36997d9e707ecec8f174a4be1b4df1c89db4e9d41ca43de0226a3143b06cde7981b0df3901f6ffdbaa03895bd8d97040abe0946b9ab439da529a5217f1f9d2d719eb3254f48f6b6169e1e0b2f8a12e5da5461e93aee3ab1a29e0e647276f92acbb110fd66debf42165d5f1ea7f8dbbef625fd5b8dcec1bc5398815178f328927d3050649ab1bd5aeb2bd9c3d41c7abb37a96a53edeb9b579925dab168f546bf25f59c71012802896e710b83f0000001ffc388e53c0d5c91001624e8cf0e0af9ba19aa4c831382e1e1ef1b97e2f76d9298c760faaa005312dc45af34a0906b8b520c06a1a50bfe2c766fbae49cf", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) [ 189.709036] tmpfs: No value for mount option 'ev/loop#' 14:05:22 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) gettid() openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) exit_group(0x6) writev(0xffffffffffffffff, &(0x7f0000000080), 0x1a6) 14:05:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x2, 0x2000000000) fcntl$notify(r0, 0x402, 0x4) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000)=0x3, 0x4) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECCOMP(0x15) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000980)=""/4096, &(0x7f0000000580)=0x1000) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xffffffa8) sysinfo(&(0x7f00000004c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="2a0006000000000073000092c4e9ba00050000000000000003000000000000651607002e2f66696c653047fa971177532d06d8"], 0x2a) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f00000005c0)={0x0, 0x3, [@local, @remote, @broadcast]}) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:05:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x800000000001, 0x0, 0xffffffffffffff44, 0x0}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000880)={'filter\x00', 0x1000, "7882a49267b82f9d11cbf8abd72eaa3bcb7474d406c7950edce7cab8e0a9886f51a345b547715245372c2b471c33d82017a1dde30c1745a4fca6f3a88af79aede26eb0c3b18c3534114ff022f3cb40fda286b6c669cd95246d727ff841cb5b482dc2a911aefe5f5b664cdbfd8ed56c14be578e7ab0e6c57410bd691117896f37e17212da1ec7758ed7db3f23365f10a546aa1930c7cf420d81fb9aa0f70ed6f29af45649797c577c8a03e0e94d9a4f8feb8bbbe85c54ad4c9a7119353c7412add3b9cafff3bfcb3956f17d7dde3a1ee71d5c17e7a08f1b38e902347cabadb8199b3a477a3f31a307a303e88c3a5fcaf686747d04350d4ae2026be1962cfbb8f512fe7993e6bfa3c0e602d1207df1fee3fe10ab7618022b19db4b0443593ed5491370feac51dc600e9ba147f36798f5b86f019e720eec6345ec771937f7ba7cc7f3609592f4f92d2172047e37a073fa691c84b15748d639c154c4ddc71e7a262d16565240ff124c7c9dd4410650bf3094e9d5817cbd47df0881f3057d5e86331a54632f997796ecb865e06bc775741fce76af147035f842a72b3c371783678be942011024c5a59f2d2f5a4b105f22c9a55133832018a8127ea0d7826af5ea252bdfa3cb0c00157a66801babf850b0dd11c27d94209ed595ad4cba3a82c7d95a08ddb768f4689280331af5ffcbbcbf4ab1f0622943db94973c475deff4b6053d98b8a6587e720f331f84739ea8b1921d9f375d9d622688cf21da02f31dc6677a1cb8a3698283fb97433b5a5c0e53ee9192af54af1899958ab5751d31663bad0933b89320d1cb70577277f5b1e8f0fe2bda4fa964b82e4d05f10a30cb78051c6772ebc017191077744a8c4c70b5f6c8b6f1a18b2b580895212864688c22afd92e81372f8bc8ed0f8c1734ac3b22b137a74bbc32473bb0bc3be85e5889f6bf1061013d2773c6fd6a2d53f71b5e2ae2c3652d70f8c779f25bc90ca0ae528ddcbb6af768fa45311e770378cb7bd4104061ffe3826d1e7cf2c6898b23ea2cc382bfe8be84d557b2e813636d888bde70e2d87ea1b3f7e830c4ab9f022eb595f6da93b1e4a546aba3bf3310223f28463d8e05952824738fb4d31f5cce909ea9db1dc440f058025d9122f2c12513577fd258e54f9879cf8a09129e33814670d707bb0c072dccf7ceef4a3d9c2eb95da96bc605a390a7369855de155259dd588cdde3a9f43ed9c83d4b78d20eecf4db51496a040065839736301c3b9150969090c9f3cb12c962a0377d3468a3bcc9ab5cf4baa4919e83d6a299b55054798e4de432dc2efe9bab51c53c35dddeadeddd90296ab9797d86ef7ebb9c362b8217d4e37da509f17c83c239c78c3ed767e1e1b4a34c0d4f54cde9760278fd7f846cd1f93397747c5447b2069512df7eef6c8fb2a237a18e5f6e99458dab2abb8ea9bfa361d86dc2c1a3c31caed563d8cf5c7ac5f519a43902182866c44bd1b2b0f9c1923c28b33174ccf07f8fca4e86dce93c96f98cfad6036eed23fb66b79f0ee04eda46abb2ee2c50e1c4f39c92d24e76463c94c606bdf790f53aaa83e279e48ba8516071039e5b36ffb40b651135d7cd7c013d7000482b9c762b63d347f4e8efe8f918b1e520b808ec19b92bb47fccabf29ee4b7855dc21d11b9d112bf1e18dafa1197a1c3d74a32a3a76d0a0dc3cc6e4035d53008094d451009f3893bcfe8ddb9559546d12b653d9e088e331181b8cf8789d9455bfa9307af1b415cad673cd06e04647d7b8f878358b264110514b431a7f3aa6a3ebf38868eedb7514dc7dd48f58571b398a3cb86e15f43f8d97db3aa08ea86243e9b32ba6b3c0e099e70787daf07a2b1839ca1fc5d5a843c4e4a7d2cced2d39d2797b3e2eb6c725554daaac7160018b975b95ad8c59f0c0fca24279abebebd1f2a54a1243811889e3c9501030c3c162778eb623e3c98f9dd9304b90cd1e6e066062bc2cfc6b4882bc1dfc67577571f02b0f1a12ef9074e56956c08406eba51fd007d998793f62b585f35c53d83fa5af0bfb32ab9ec00030eaeedd7768365d79c44537f80caf986835c66a025fb1d197e2446e216825b82c69827c4c42e03bf994637affc74ce24cac46217485f517da557245d333f2c50aa006a30e72c62be090f19125e25f268b5667ea30115dad0d968d96a894bca229430fbb5bad81fef2a2c1629ba059dfc7a245b95878e858f8f16ba1ef5f332c84de106515a325354af00d8698b735fd382bcd2b74f25016947197bde66e8807e51d343463a79b837ba47d427f31e534a36cb59cee73d1f972ae1ebf76540e6e6ec770bf17bc80255bb607a038ba400e4cb9044fd7b9f0d0e94977bf8b34f557ed7b29ec9020c70e419d8b35f8e52f56e05f5a34c561bb56603ec2dce7b4b8692be2aadab0c7917c161adb74320f49784e588927980c8e4d7da3ba08a7f35d65e98b934341d26388d19c750e25841e62ec9ba8117acbd46b4a5bafe3f9b162dfad849910d0ae74308030319416eec103e10c819442af9c40382e1594bb50693fc757832ede337ea0bd9e2b61f7b933f545e6418d86f0f6e65c1569253c8c393d00dfbdc2a1d1167caea8aa9c1ce11348f76b41dd6bf5e97d1d03f885bc23ed871d99770045f42d06ca80652026c539fd2cc19b08c3cbfea6bd05d135a0953614b24b47e03d6d1c344d5c514a562a24ef0855cf088a1836bb3d958027760e6293c32160d70cc4d72ab362b4b5de31fc1abd2b15c65df03252959d3328b252e5e04392a1d3d0b15d8d490588e51068cd325ce532bb0b748903e394c10f57fb8ee7517e9419f4a66a84add06fd6f5033be011f787fa9ab75463a3e0b697fdc608f3cc336c3c185670e44b4225486d3914286590d0fce90044234c8b62dd32e6ff01eedfea08fc890d06148d660da16af8c1759dc1957e8015069301fc5cca1d61505ec8528dd0772cf08acf8058fc797e85e956f13258a6e8f0d220fe7dc00fa62de8fe0e50503221da0e0ea51e680b4a68ed8583b71193a13a9d58271db4d37763403c7cf6a645baf1598e687cd5fa64fdb6f7f4a06915b60535a8fe40998956a9cd18cae4abbf5d81bb4b1c18debc0b9acf805ce5c95ceb7bac5b109b146649e137e16f897de983adf712dfb26a9787995d092f9047b2aac03b57b50f391ec73c09cd945a779b99e4b9fb44f9b9a7f9dba055be7bc3e58753ce158ffb0bea6b195b3bd4282b61c595f13f16af7d2d1cf9531678319dd3acd1231e2f0cfd2592301b007b91b48a7c6a3e280fa4dc8c5f3d6a780772057ac67ab9ce960df0fec0d25d08d11367e218f693181021e0e8805dec06e9cd59a4e2774c3ab38a1a5f591c1a7277d1d0cce7792103c5155c8113972a7a82510fec7269f813a3507ec14b11c070b451fa90445ec8c8ba1ed6e8d8bd4991ba03e7ad3c1706c2b3a4f91f3775cd64caa6718f9264bdd0351b21bcd25e151ef626da952c6a85a3c0c83cbc432924469092d9f653a60c117b37604e6376a2c2fa23456c9040b3c848804790ac49d4a4e95cfd63f6e82c9c921b395e0dcf91c8c62e72be46d78a4a12cb082c4bccfd112ccb40ab104ab672cb5e2d08051834710232285db46b232467d902530d608c04ea58e2fb50f5d6abf33f75ca67ef155dcb77164d8e6fff0f2767906b73a0bc0e81fc28700f645b19959b112cded2d9e4f37bdacc55ccd749a01df7e9ec4c9158330223da993dc9717310b32e77bebcfb7f60d224f0240493e0f7fc5b93026704738eda1cf286e75e2144cb6792b0bf921632e21f96d760c515843c38492785ac1f9a8b149db6e6972ba02e779510cccea7134d6a707485ac4e052ad7dacb4c136f56590c7f2a792ac238d3872530aeb7fda2367b30f0fe232f301ad7b1a3a32fc9a079006de9df1c452e8abc8e6341c9454272b3792c911add3ba48007cae85cad71ddc03002129652f17713b71b5d59f6f6182c26bca5d71ddfb476e93d0993fa701babfbbb7e02d6d26099fc6a69aba5320b8dcb8c5d9bab2c4e4d0661bcb9a84312b022485b3408e10f9a3713f67a7a55e1bfc3cd89db04a1857c463a1ebe0d1edd905246fbfdf92d3b04e34f630989d0d5d0abbc4be88e7046555e82cf388d33eb5e8f2e4c0438bd844b98fd7a6e7688f99087ac458d6c22438c49efb990a58e14fb0639ff80f7067cbc96253e6f79793f7d8be9f1aa1135ff8783bf93449087e024e3a1784ab1aa963e6ef545de747f32cb66674e1c8b30fa1ea8f5a15309f8427ad9f9c9b841f618e3950b356d33a14da52774bc82c13e3dc2325bd81c7fc6c21518270cd6360ef876de1ce9ee8388170a3ab5a5d36e9fbdca3ceb51edfcd0fc7bc222ce111e7e2e27fd9c0ff3c74fecabfcaf83b6832e631ce3c10f4308a295f275e828ffb6d48a4c1c982a72d82af16987bc827dff010d5b6734352335caf0f1fa8a40553931a98a947abb20e0256c920b757b63c70b8048757f545d626cdc36c682684f17f43aae4473d09aafa37169be8e2d736bc928f7fc44fbfc6a9ef8f904e2b5eb187d5f226f13d4bd0c804a7ac7ed839f9eeef058f9378d7171ad43c8ab455b64bad454773640ab12a572bcd058e8356942be062930c609b95d4e8c25525dc57f6146a89cdf5887b785fc07d9524aceef3c7e3e621b1ab754f7beb5eb6c1e0bd822ffb5d2e30f2a7f2fbd2142899dd34adb50e6c3422a305934ec848634a3d0781c4226d2fadb935f90235c2d7cc055fd512955efcba0cbc9a430504a95cbcbc8e51deaf170259a44958b561f2f1703063b5b648216f4f4d7f4b5fb216b9a42e56f7614c466b48e2c194de727aea0516e24fdb892c79e1eb5910bd1684d7988523627957ca2df2af98f6dea97c3242e136b6631310ff12d88ddb253a3b219c226647b63501bf2bf76424c4ebcc69ebdca8c9df9956c8dc1d1cbea109cb1c3db7cbcd9e3d3a86c410742477dff84f72dd9e4f129b30a0579384690d14c0ea4fc6e16c7099f16bb34804256ef13d197db2191b4d2e28c88e93d45aae70e0341cbb5e5b92ad487498a30de373c41c55db81d0e228739827643cb071fe214e401e894f5719f45c88808a4c877b7eaed72c06ba90660cfd8ac3ead47d29e3617467897e36a1ceafb011dff7ae1e587cf424e9d0712d01d5d58320a1b57907e362bed390523d242aef0e378500bb025d7017db1752d4051bfc8927b0d15c9b94a6cb16fdc5315b62ed791e5f57db7ce17c1301b80a944793db222239c2560607fec13d4f7f5a25dd92a7405b3cf1beb503497b13771d6ca944115e531433e494716e3f6fc36188e1017aea207388c1c123d2792883d1269430cb9a3642e7e4481ed3645de2faf6e26ea9028dbc80a9fca3c1868273fbef5d402a7af2f3b5fe3f68772e3aee0e741f65135f5bd8015befb86d16a94d612240c04cafbde120fd78710c272f16299cd8a3d98f94db3e03afd196b2b42fb9ad01bd24165f344ad0a48b2f231a2519330285063b4995fabe070e625b50621cc3805b26605be30dd5195cb1a719cbcf5b31c87c761c73c9a1a1c1976c899fbf7147cef5a1854e491e4d9b77989f3abf03b2d432832ae59333679906a02993242e156faa1361655c84d89e39a15296b9ab4aed806b7bef2348f7772e24f205c87c952ce0268bbaef08785a32a07375c364d7f227d3f33187aece9987518e4b4c8e01c3ecd3fadd890d9959a9f5dca1da9c5387df639015eb63168a000a1ac1f60af6f54736deb3f7bbcb98c628cd39a9fdae88378f9eb6df81682a4520f81a88"}, &(0x7f0000000040)=0x1024) 14:05:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x402000, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0x7, 0x7, 0x40, 0x20}) 14:05:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x2000) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x200000, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) [ 190.206728] tmpfs: No value for mount option 'ev/loop#' 14:05:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f00000005c0)={&(0x7f0000000000), 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x124, r5, 0x604, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc22}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4b193ec9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7eb1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x1}, 0x8000) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r6, &(0x7f00000004c0)=ANY=[@ANYBLOB="2a000000290100010000e8d228bab247c29d00000000000003000000000000000007002e2f66696c653020344fa041124125456be80c7a735c6028f6669414342942bb16997a75e13fbc0785fab8dba5b7ae1e3709c2be450970c9dc38817f7a196e577d0e4cc7d86b371a1b1b8b02e83e92a8177af95a385f8726789fd7be6fb95e5891d4bfd1c6052b"], 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:05:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:22 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={0x3}, &(0x7f0000000040), 0x8) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000240)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) clock_nanosleep(0x2, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x802, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x3, 'bond_slave_1\x00'}, 0x18) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000000)) [ 190.347670] tmpfs: No value for mount option 'ev/loop#' 14:05:22 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) gettid() openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) exit_group(0x6) writev(0xffffffffffffffff, &(0x7f0000000080), 0x1a6) 14:05:22 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={0x0, {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:22 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x80000001, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x0, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x6, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x8, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x4e21, 0x8, @rand_addr="30e184201d27f0df83169e4765f80328", 0x4}, {0xa, 0x4e24, 0x0, @loopback}, 0x8, [0x10001, 0x7bd2, 0x2, 0x81, 0x9, 0x100000000, 0x8, 0x2]}, 0x5c) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="2a000000290100010000000000000000050000000000000003000000000000000007002e2f64696c6530"], 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:05:22 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0xffffffffffffff0b, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) getdents(r1, &(0x7f0000000040)=""/49, 0x31) 14:05:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001300)=@getae={0x178, 0x1f, 0x130, 0x70bd25, 0x25dfdbfe, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d6, 0xa, 0xff}, @in=@dev={0xac, 0x14, 0x14, 0xa}, 0xb55a, 0x3500}, [@ipv4_hthresh={0x8, 0x3, {0x6, 0x15}}, @encap={0x1c, 0x4, {0xffffffffffffffff, 0x4e21, 0x4e23, @in6=@mcast1}}, @algo_crypt={0xf8, 0x2, {{'ecb-cast6-avx\x00'}, 0x578, "9c617e587da66eb79dbc1b2cb69d4124111cfcea2e1039e04bf2e3752d52ccd6c3cf4654613ce2287ef0c0835c4de2c53566dabb5abe495acd047b837464966ebd1c014e4b79e5c7a8c20b666bb18f64242b2b2f9e7b163b5fc9781d33067df47f4150e458c22ed2e1b45d0d4545284f432d65a3d2daeb0fc0d84ce49eeba854a59fbfa6a1ac4301751b7086b68c6ef8c17326f4cf4698f08d78ebf9b157c03395f747c873660eed85b91913cf139b"}}, @encap={0x1c, 0x4, {0x1, 0x4e20, 0x4e21, @in=@multicast1}}]}, 0x178}, 0x1, 0x0, 0x0, 0x400c0}, 0x4) sysinfo(&(0x7f0000000240)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0xffffffffffffc492, 0x1000, 0x1000, &(0x7f0000000300)="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"}) 14:05:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:23 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={0x0, {}, 0x0, 0x0}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) eventfd2(0x6604, 0x800) sysinfo(&(0x7f00000000c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) [ 191.009783] tmpfs: No value for mount option 'ev/loop#' 14:05:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000240)=""/154) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000000)=0x1b, 0x4) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f00000004c0)=""/177, &(0x7f0000000000)=0xb1) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:05:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000040)=""/154) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) recvfrom$inet(r0, &(0x7f0000000340)=""/233, 0xe9, 0x2000, &(0x7f0000000440)={0x2, 0x4e21, @loopback}, 0x10) prctl$PR_CAPBSET_DROP(0x18, 0x10) setreuid(r1, r2) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0}) 14:05:23 executing program 1: sysinfo(&(0x7f00000007c0)=""/154) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000100)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x3c, @loopback, 0x4e22, 0x4, 'sh\x00', 0x3, 0x7ff, 0x5e}, 0x2c) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) [ 191.189395] tmpfs: No value for mount option 'ev/loop#' 14:05:23 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) gettid() openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) exit_group(0x6) writev(0xffffffffffffffff, &(0x7f0000000080), 0x1a6) 14:05:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x4) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:05:23 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000000)) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000080)) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000000c0)={0x6, 0x4}) 14:05:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:23 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') exit_group(0x6) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:23 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/154) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x5, 0x0, 0xb, 0x1b, 0x14, "d222813f6893d4f092aed4025c7c247271f632b54fd99958429f6c6227ede0ebea3be0a39380fe73428cec242faa4c022f711af7b5521a5770f1366c1dc31892", "c6d25b50d80af43ee0f436a5eb0db23c682bb6533331337b5fb8f7cc882e90adc674184d9fdfd5b0b34a474cac9a798c509d2003921ee8de2e970e9197665965", "eed485bb2d63cec36cac67b2ed57fde3dc252e5e08bc728bef899c691f6bbee7", [0x3, 0x6]}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:23 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2, 0x40) sysinfo(&(0x7f00000007c0)=""/154) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x3) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f00000000c0)={0x7ff, 0x16, 0x0, 0x3, "00028d0685c223ca6d6fb6d62ad09b319a3ec91782a69fb1056024e282e09da4"}) [ 191.920970] tmpfs: No value for mount option 'ev/loop#' 14:05:23 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:23 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f00000004c0)={0x0, {0x2, 0x4e21, @multicast2}, {0x2, 0x1, @rand_addr=0x5}, {0x2, 0x8e, @local}, 0x1, 0x0, 0x0, 0x0, 0x400, &(0x7f0000000000)='vxcan1\x00', 0x9, 0xd96, 0x9}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:05:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x6, 0x1b, 0x16, 0x11, "d4a07a09d73153054c541efdfea839be9a27aa7a70613aaf7a087f9ab594352ec315fa317fc46a531baeca7a717de4868b5c95e8aa790658f54aba1073a2eaa3", "086b61dedadf82ae65a62c792efa768d8eaba321ab52d266ef66c5f4eafd4e5c", [0x3, 0x8]}) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) lseek(r0, 0x0, 0x7) sysinfo(&(0x7f00000007c0)=""/154) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000000)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) rt_tgsigqueueinfo(r4, r4, 0x38, &(0x7f0000000000)={0x35, 0xd9, 0x5cd}) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 192.085696] tmpfs: No value for mount option 'ev/loop#' 14:05:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={0x0, {}, 0x0, 0x0}, &(0x7f0000000440)={0x0, {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x10000002008003, 0x100fd) sysinfo(&(0x7f00000007c0)=""/154) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xff, 0x5, 0x18, 0x4, "84afd27f45ce1502fb05d8663fa70c4a694a0d6ad585be351ef7893d9d8a13a32c31b32ee439fef1d7b1bbad0c4a0665c7dc563257fc8da6a3827d344ac29770", "1e3e1672abb1b743eabfef43d4f5524dacd966e33631d9373319765a6da88f67", [0x6, 0x3]}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0xe, 0x4, "524df667eccdb5ddb7a91468d4c82f94534e42499ddc29e63556ba59bb76e6533821792fd02a7b0dd8de25fd90241f96d6f88842e27bf3aa519ead66e18963dc", "f13102928644e72d9e8de903cb43e569eb582bcea9cb6cee75ad9ee39d2e7f1c", [0x1, 0x3ff]}) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000340)={0x2, 0x0, @loopback}, &(0x7f0000000380)=0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000003c0)={0x3, 'bond0\x00', 0x1}, 0x18) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000880)=""/4096, 0x1000) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0}) r1 = socket(0x8, 0x3, 0xfffffffffffffff9) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) sendmmsg(r1, &(0x7f0000002ec0)=[{{&(0x7f00000005c0)=@hci={0x1f, r2}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000080)="d202b318", 0x4}, {&(0x7f0000000680)="dd0b622f80d08d2aa4396802761f83d58dcc4f120a2a426faa27f46ae0ce7eb2e8a3a8e62642a5984f90506871", 0x93}], 0x2, &(0x7f0000001880)=[{0x88, 0x0, 0x7a58, "0a92248826b7a35e15e9fe3776d81f5789b5b0b4f876871255d0e5f6e0e0bf3a1edab4c7f0603dd378fc1e827ef03b1d312655d1f26ef1d42bfc05376373d48c905376d96ae4127a9eaf725aa21a87d06cb14df5e2e11ee0d9deac5216310b31531a63185cbf9bf986e3f78ba4112bd3b6e8b5a66f52d59b"}, {0x100, 0x117, 0x91, "e439b14bc3ebb19b75a3138681910d00535ef6ca4786e3e1c2c9c6f61ae37d9ec012d8ada72003c2f8c46d6f9e3d0c4d6361d1484d15def395f83ad196e642c322b13e75f65a6f9ca2c1169577ea995b6d459e3720127e612c00b68c75e816b58bdda6e86b4ccaafd1d214d455cb0a5e557c23a65a68ce92bc7f3a9d6ba0bccb28e2f840d736e8e0bf7fe9720dbba064eb5b82087c680a28df2bac7d0b653bf219dfaecaba44884c45afd8ad4768af887b3b09aedcb34eadd1ccc53de7b7abb2a56e137284f214db34ce71046cf3e9b9b035c9d3e6ff59ddd529668734381e9ea5f2c5be430f38e668c5a22195"}, {0x18, 0x116, 0x5, "e77900a4b1cda6d4"}], 0x1a0}, 0x7}, {{&(0x7f0000000700)=@nfc={0x27, 0x1, 0x2, 0x2}, 0xff71, &(0x7f0000000780)=[{&(0x7f0000001a40)="1bfb3337bd0be0e35d8c84c0e9150b85c2b72e9782f5900a3428fdb0f0b7ae355c812ab082b88dd146a1f5749766d8f62b8c099c4c83b4e9756d0764bfeef0f653c2888ede8f97c8bc6e0a58f54319", 0x4f}], 0x1, &(0x7f0000002f40)=ANY=[@ANYBLOB="6000000000000000160100000100010045f68a2bbb76db36858bd6e99d1b91c75cb2401445dc30374395f40c1c04744276ecb2c13301e9e7e97e6f4d8a02d80993ae61472e229d8e3bc9be68f1b8f4fdb333733919b87cc51a98000000000000480000000000000019010000d50b00008898e8d857cbeed9682d4476008e4ae90fff1872df68d827e8d0fe9053ad49be10e9e9d2961c79d81314f52ec64984dc406f81842b30140010100000000000009f010000cebf0000d579459200ed66facab5c1c5636aa3cca0e80b00c3c47c6d5e9f956821b6cde881b2e60eedc9cf228393e74353478755e198375ffd241c3ce8fe34814fb366131cae3967ed9ac130f3155a63940ada43199bdfe3f6be86b5903cd705e3a4791cb6ee2dbccc04ef49bdf60c3dbaf89a59b3e783e8eda832eb3170baf2aa7be5dcc373fa65473382125fe4de19aec957abec824357c30e85ab15576bc0ae18d4a30bb444c6a765515c05bfac8506880e6f8386246f144eca7c98bf15071e78bfa1d7456310ba4f0bc60f510d03f6ea0057a5b06303cd61715590f3f8debcff2b54234cdc02b245e7341c9c603ade9ef6cc44eff8fdc034def1ca9788f8eea514c785a9c7cf1da5a128705481a6f60f33fc36be32f6c8c9c04cfa249296efcaf1d804be87b1f28983bf7c9785fe2ec4d863b53fecb5e53299ad2b22f4cde804147529c038f712a738c6a8d939ee3c05f78ce1d64342bb6dc7c67f5ed6aa7f903e1101247cc2418243479fa6475cc79ad3119fab7f37f1f501a03974a442993c234bdc6b74552f8f9ea6829848b01d368481284627e3dbb43ae6d24ed5d56c7051e5897b1a0b133218dda158704943b0ec4532076e7008480143a64ab537b1c1ffe9a50912fb59b26a5b43f571561b6354f0d81bdb581dd6548009863dc0c529ebe93f8f2ed2515864495f23a25a25ea22c9e35e169a6ba4fedc31d0d0d474f85773925f882320e263cf741636c51a23dc9d5f6e811f9a0c7f0a56b5ca823440f942fb4e31125ea1f1a91cf9b5e544388902c2ed911ece6c6197d472c64c48b3a018d337c318e5fa49e2895243d4a4c8d1128b526fcb26b625786d1a01d71ccc48cd06276843302168927b40233a15235cdefa0d253f86bdefa2e6350f6813958255c385b96d00c017843320b8f889219104e413cb71794ccc87a5b6199863834aa02f62ae157e9ce52efc2cb269e047b36b81685f10ca99e7a919795e54eebdcda3345fc43b74f892be39b388702f4c1bb2d129f200a48b9d9ccbfde71bd101401763d281228b9fe9b464e89fec891cd4d86c82e6f2e1d60479a0cae45073fa8d2d7d2825bd00bc00039bde56d65d8268daf9b6cf9c72ea5efc8e8a1d543dd9c5b4e2c37f3c6fa6d38e5b63b9c06c35989ef25e52ff74d0f6819d15d771e46f8dac4f9ef04363b5a17e3335ada4eb3f7fe508cb34844cc4eb147a114a3279b98f57bc52228d71c7df96cceec0f8e64fc87e8c391d310df16e63b60ed7120506fb609d81be17c80a7c6c396c333d2debf93894b03b9f9f9a6e42a728eda0fc9d97bbc41c0add18b2127460dea5569e5b102b7773a56a834663648cd3d731f91e58b58ffe2aa0920de1874f60d525eec1cf6c4fb396b5307598cb33def622ac5397f71e457e21904232203414ae05515583685e8bb65cd7c686bb023abd0c5ddb015e53868df924fab4a6d2111427015f40c035ec982d060100a74d501507985c6b0ee40cb2284edd46a2f100e039b892ca9dcfbe1b9c13c426dc1599247ee9581fd72e2031a358d81955a53f6ffd5c0738700b65395ce86191d34e0309219d42b2124490ef5466b094602ab0d665565556efc53d72bc99f0d2354b9671f538df91c3cdbd4b7cd2fe9a8b5d6cf31b4b8e09bd4e2ea08d842aa151deffb87cf1cd03cc6f57c82199e97df794ebfc9269ceaf220d34e730943e2a7f8e62b6c122e6281753e0b7d58bebd8dea5af0dec5556fc52c2b43eb15d82b0c7bc5ec9e9bb711693f10920977648faccebecd77f433e577b0be9b7f86d5cc9d7d64ead12889bf6b3ca0da034f8bcf582e8b4a39d53114683c7b29757930ca3ce1f306502e5ce02741ffa270d2598c03a5bd6c04553b30f3c37d60c56b4ec7a129fd91bb23bf8aa2d7050e0a73cfc788ac4b586ae9bbe308b591412127a5c52ba208990e2f8ea35b69830233918e8652db1a4d967a3051dacc9132d623fc5ac23eb4804143e1b0939b3447ae1626d7e2d990456de2ad17e83211fbdbf4cc97f38a034ddd88ad83b585c3e72044226a8d5868ba4a3bb70b20c98a4dc15e585fdf708df1d754bf8256c742fc258f873d4f66e4f5a9c11ea65b4507011c4c6fa4f8fed7cc213f351b69ad481cc07bcdaefea34f09cf6d4b4a9aa432da8bf32e58ba2f4d98cd41ddaf91c9815c7d0aa80d12ab67ca44b6d99c76d266f77247a5b208155c0e69dbcacc6d681f15329657493f22ef55654c4b43b5127b6b05882be63f41951f86d98ebab2e82b6f79d99e60cae274dde6d07be6008b926acb86ec2b87ac482c1e3899d1c8412e70e360c2e0324cb34b1924238aa6ba2315e2a3b1990b27dc7ac72c40f1301b87b3b7c3f85679e23cb82bca608b8d8f7cfe18da5884994c7bd83403749a8aca452c21597651e25770f3239dfc34847be959b5a66d4f9f7d890ad41e56d83f69c87f942c57ae528a7df4473caa2e8eba9e7ec5b48caa9208ce044937ca3ad32729bece3c26185acfbe0970da1fd0f04c8750e51315d2bceeaec6c8dc4d88119020c4e41a8afdd208df16bf6a2cdfc07517f465b0ed400608c6d3ec63196b01a4ddd45030f533ac63163ad3bf3b9ff888bbfa3b0ac153c4f51f8de12c5db482d5b484e26a07d8a4fe0f0d13bacf066b6183aaf65f963bee3fdd45f6708fe712b165a5ba4746345a02e682015f4d020e337a93ea243b0fc22553137976144acc965c93e84c3fb53ec883e0dff26d34b4bd7c5d2f068ba9806773e7dbeb550362829d8761d891d130e494d6b1fff67d501c1b6653d72ea1f3faf08f22a231579e177e1ceb443cb02ab9cb2f7504703194c09c9e93808719dd071abf3838ed4db9c2f24c94fc9c7f84225e3be6f64fb27cf522f5a38ad429925e1d9b821e6dd556b433b795177d933b25a8e9027fe76e519bede2133c6a6a6e6ffaa66b7efc839713713d73ecfe3cb6fafe60a4fb1974b018b5fa20bfe5fe22742f476a18daa53d40957c6608a9b007140eeefb3c66e868c5a0308800c2b1f7f286dc4ee15a50dffccdf0a5ae6ca8d755fa11fcd01d06c989b8e7ed60095e49b611506ddc1baa6a2d58ad2a417d6a22b17ab85fc4c9c96d4801522c14227ef6c3e81aca6ebd101ce02cf626cd67469bf5455ab857c1559f04fd690e5e04198d8910b30f5bc1cece7e9d0ed726c750feb73619a3462cd801b12d60b0acdd47e7f734824bb5f5b04d2c8454629be6f10c09cf4689a8c47add26b10b16fd8125bbfffa824f5b90ca7cb211544f29ecb671135141398e52f241300df96df2571d10b4207d07695816d81a0b721e7aeabcf4dc5441e3159d7b3e258236f20087803574ff47986f35fc9be9d7842646d830cde07d902189e9caf1c4917a9f7beb669ea5dac7bb38c47888998a844b12fe94bac70946367bb11ac5e7e123b192ee62a19e29e685164b2ebb976e0928e293a5b16fe0e51fa96c1433161793a7fba5326f424f6bd4ad894c9f11dce3cc23ecd76d05d0fbc589752881a08b2355bcf94576693b4bdb484ee416f4aaa7a054825e2c741b22024c5ddff2390277230226997641cabf8fb790f97e5e5515acf0621c007be80484a8faba7db979a35aee3567687ff1ab21deac36fd6abe12d3b8dec21a50c6bc8235d8e0e69828752b7ddbe0b171a273e36ae5e109cf5cf93d9ab271c6dbe39571879aece774b8af029594b7c40f9b9c7ac063473e307217238e700bb283b0d63de811a2e1cedf8b1efa607a9eeb7c0fbe8f5f307f357c36821d1f168c478eed47a2a71614667badc0a58d6cf4b57d74b5230f483e47256510bfcfa55da00eced1ae8b0b3771918ec90ee0c619e0a74afdea5e9954c8928d9c51bbac466e214aa84b95e2024f5264e48ee5e4c9e3d22fed1fea45155f9120c1b265c09b708b382be85f087dcfec9807b9a2cc043dc488fe2df6b7fd5ad63cb8907c595af10a2a8459810e417fb07129cf6f58efe886b26331c9179aaabfa060c234c16cbddab9f2f3343b3beac3bc60e7d25c4b3b03d60843f4975f73970f9be2ceca97e78b55ba1042e7a237201d960ae29a78fb5e3f5b7737d8196bd92b4af99690c1935625354f4b307dff3b8914b4b43c0bad160031deb29e5503132ea4fbb0e19de02ca59e017190608d2eea38e92a3fcaacb496469fc98f302fe89a28ab62724958f7609a42ae3d7db07e17659830051a4ce7a72e179b26e50ef5b7d5a14faea69770c8c4d7a5406df643320977c85a422135ec836cc41e7b9cd39d77e31390abd32a08abae3ab03cf68352c3b015176ec557104e67070aafdbd9057a9b5f642bf522d4225a4229de14fe8e285dd2db9b9a5ceec80da620102e637ca506a6cc5ec0e44c3bd85a5ab815ce056d5a17ab3a97f9b5f231e74b3fe6927410f335fed0665d16225623f6c061faba11b27c451c62a71b1d5b19c145f74ccd0df826e30660ffd2e84621b591831f34098060ff10b33e77f3d17638ab3c021f31e376ce8cd26998460abfa9268d783e9c80dc62534064101073f28b5fcd865c84eb6ae10bbe42361dd18ca0f3f8ceeb2fbd633681d4e57230fd99dc6defd7a195e5a3e288db23258f4fba7ce5c48a04b2361bde8a22973f4824082485da2cd54f288e5491d10e8d8f3a82d884f74a9442f55018562957ef2baaf668f7526b9402935572b76d8438bed9623e7c316aa2145b617944d34010ce80f396e270928aefd40a2949cce5053a6dffa86f628357fb8aeb70b030e0d16c262d6faa59468fb7c32ab32bb5d0159e414a551b1c8e9a2db3cf4a3c94ef4b44191e1151a69eb34a8e0bc736268d2b649e595b40f678669c6d5106db9d136314b16dcc5041337ff63e51cdacfb6d316b381cb2237ef872f7043fb20980a861ec4aa21f2cbd8d14216b5b7459de961e20635b94b27fdb1c676785e3ec59fdadad55a9960ccd1419d4b64e24c9d80a1ab17c3e07cba978ec565a21af9faedb54f441de1f8008f33ef07327b9bea6d83540b9b478a1a4b455ce695859014667451d58b9c3086d81634fb57799615d89e221c9e864296569d13c32987fcf9f04b2404a00574d61f93043540a0800c59c14f863c1518d35a29c02a82e4c4a7fa97861fe7c7b45330ffb4b1f2b9743ea398c7fa6d65a663dac1a3fdcea897872d62e8c955bea30e42209358d27fb4f6f7911a58632fc364034b7112d69a761930555390abe7979a4731d7d3329bfc7bfd95f4b7f0c15e21e5690da0de98c65a6a16f6352834ca8c5f309763d03002856a6cab80031727127779ec6ada067e700f9a3793a34a19c0f4cd9148e4a9c54ec3ce5e3df0b4b291bf12d9a45b56ee7f8400dfc37b4d933ddb8badfcd18ae71f937116fb3eb049cf8479fbfdce57afa12b6f8a93345144638013941395a5417437c7526a9f9adbbc748b110a2ebf97e46cfbaefbba6565401170fc6e025214ae2c493f20ac6e61bc776bb766f32842aa804d4390098573bba0ae1b490fcb01d58fd38a2f4d701629fd742f09b2771c0abc96537661fcdbcc1c1aead955f91f6fcbb84f7fed3d81bab96365496f66cce8f704792a92d256cc8db149b1b46a36456984fb328b32ddbfcfc7e9868a3d9f0b881457578deb66f38ae1e6404b1154235cc4fb0ada7ae69275020cd35874fa507a1eae3d62183191fdac21cd274e69e643c5e41c29575a80475d93675851629785f519741ab6b9c5c9bf75bec03625a5529bb3618e9d8582c50bfcf0f8f223f2a5b135c01d307c21a0c68fb0b514f598030e75c04d80794115468a0c71d36be14e129dad04ff67adf0000000000000001f01000008000000371ffdcfd7d59e88fc4c02647c8d5d01a46ff1ef6772e9e18e13b02dd459ded8949fbf00fc95b0cf9fe0674ae1a815cb7df6ef3f32708682488cf4a8deb3f1fda493316a2fde136051f310baf0bdef846114a04ebd99a6eaef7325a9478bb640aba5b1f64ddccc96791231dcf0a3e3f940860ebf8378db3fff7b42a34f0ec4bd344f40b42edfb4e9e3988185448d50c97e8929b2095ade520c6af2e29477116c257d35dc6ebef8689d68993c96569003c1f2a1b21e31c50355cd602c79ac0a3678d89e2fd7605457879090bb49d1dc955829e4b35c6ecd21fa778d5e0000000030000000000000008f010000000100000a66406d0ea68f6eb537212eafad4f8e61b79127bfd7b632cc0000000000000010010000000000000501000008000000887cd4a728701bdf747b77cb0e4b74f36aeb64414190303f1fb7688d301cf720d3940f2af771de462f9c4c48b0a63a6b7b513c9f461a2df9f056da6e5662e5a4a2669de16575001f59fa106a5ee61e8b0b05238ccf2d9af372ecd7943bb36646601197eb97974ea205661ff15310698483ef8d2b535b0937d9f6c670c198016b5b9e0734ad0852643ad5c37b8e4a38428d1853ca451ef462f65cbf09e4c3f20ae6262072629ee3d11d37c8e2c2e181c1689ba4bb03a260567484d13af69c6c627f1518ac65ababec54b754ab567ceb9fe7bf30c6411b4bf1ac0d8f955209d640a0bd5b57b8201ac7ca1756cb7064e788cba10ee7c017cea624c82214da3f7e08a3ea64544eda3b5d6ff0ae821c4f166bb3f5cc56b920f0a111795aab08da3f130f3485940516854919ec9186271b71e83113b2665d83c0c031954c22fc7f305afbcb1ffc46fc522018789f8f2f35d0f62c92aab57bfaf393bc2aa1d94109f0fb3e26f9f96cd2391b18dd86c172076462222ffb2df78c22b38d6a54acb68981164eb21ad0d5faefae894e3a17d626e2b36ed28bcd732fd20dcb40c5b6befb6cf30a2670b139bf9993780ae1626806f45d9668622132b6fc0ce3a1c70f0489452c03bfad0e246f354bb86ab49ee3ec80f20ac9f54f7f39c24bf3ef98aae5d7f3ecfafdd9aef51066c83b93aa120285cfa359351e000000000000000000000000000000000000000000080100000000000006000000ff010000804e7dcbc76a2b44f33b06846dcc994b63c191a93c95fc8a6d15b9f99c1a553629344e9578b60ea95d0c665da181fec1f2632acc4951481854387d52c82a1aa331b31103c7b7a5765fb47c770426ddb277659be758120fcdd70df27eef041be2ddc7c8cccbaf28db736742f5c2678b78ff9884ae7ceb6f4a00a8b6f3750f74e050b2168ce8c31454ca6b9b39b26886a1190d8554c448dda2eb86ff26be3dbab8439da98112ffb48a74e858c2f2b6eb75d0bfc2c11bc22249ef4045e177e4bb7ee504a583498e6e45dd20915eca018ffe2d3130e2071d2adfa59da9429e82d2ac0e2d86231efcbbcf3eb2af5eb5c3f520ba56000000000000"], 0x13f0}, 0x2}], 0x2, 0x10) [ 192.381260] tmpfs: No value for mount option 'ev/loop#' 14:05:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:24 executing program 3: clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x6) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0xff34) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffd, 0x13d}) sched_getaffinity(r0, 0x8, &(0x7f0000000200)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') exit_group(0x6) writev(r1, &(0x7f0000000080), 0x1a6) 14:05:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x103, 0x29, 0xfbcdbcadd49c1310, 0x0}) 14:05:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) getpid() fcntl$getown(r2, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r1, 0x0, 0x2, &(0x7f0000000000)=':\x00'}, 0x30) gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000004c0)=0x0) r5 = getpgid(r4) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r5, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r6, &(0x7f0000000300)={0x2a, 0x29, 0x1, {0x1, [{{0x0, 0x0, 0x5}, 0x3, 0x0, 0x7, './file0'}]}}, 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:05:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='comm\x00') ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=""/126, 0x3b}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bind$inet(r0, &(0x7f0000000540)={0x2, 0x4e22, @local}, 0x7) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082cbd7000fddbdf25020000002400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x20000081) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x134, r3, 0x710, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x167}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7511}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3207}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb70d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x61f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4008001}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000540)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000080), 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xc0, r2, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x7c}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x73f7}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x81}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}]}, 0xc0}}, 0x20000000) writev(r0, &(0x7f0000000080), 0x1a6) 14:05:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={0x0, {}, 0x0, 0x0}, &(0x7f0000000440)={0x0, {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000100)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x1, 0x9f70, 0x0, 0x0}) 14:05:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f00000000c0)='./file0\x00', r2, r1) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) 14:05:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000180)='\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0xe8) getgroups(0x4, &(0x7f0000000700)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff]) fcntl$getownex(r0, 0x10, &(0x7f0000000740)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000780)={0x0, 0x0}, &(0x7f0000000880)=0xc) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000980)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000bc0)=0x0) r13 = geteuid() stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000cc0)='/proc/self/attr/current\x00', 0x2, 0x0) r16 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000e00)=0xe8) stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)={0xd4, 0x22, 0x504, 0x70bd2a, 0x25dfdbfe, "", [@generic="2a4e6a51ac3073e999a28970c980790fd36f11978c4c82eec6db16b9fb0a25dc7f4c9e52044a0e40b94088a8ee9f14055d632f7d7bc2383d2fbe00261d204982ee9d7ede74d31b1ae683e8e43d8cc6bc7f32686dd391ace70ac2fc51bb3e1a13f3c1eeecbe2de4c951bdcfe8783182ef6fd33c64a0e9bff0a31df0613f7a03b7bb94df5870f48d3fc90b1433562b2a1984faf268535722c4e4a46fd7d657cfbb266edfc50203f7f25c3fcd700cc5d4f5b0490277", @typed={0x10, 0x4a, @str='/dev/loop#\x00'}]}, 0xd4}, {&(0x7f0000000240)={0x180, 0x2f, 0x8, 0x70bd2c, 0x25dfdbff, "", [@generic="8e8adea0da96f61cc2ed6c36664b75430c02a41b489cee3a9cebf7fb5d098f229755d5f7a409be974e17bcb0829d7e3c5e777038a0589df564d4a7eac00c2faa2b045663512ee20b17917388fdb1029a5fe7ecd54fbecacdd5f15fc2df823cff4e9424112f084c2729875b57a75dd2ca96df88b9fed303daef0782163bb8f5b360c22a56cd", @generic="4cb917c8080427b62852d8f7cbd78c7242ae50326f8d9a3ba7bc5e2892a992b61d5f62078e9da2a136fd631507de764817f6f1b04eab43971542dea928e7b94f2f9422ea129ddb7ee2ba7cf2ad80d5ea19bcb69f8e2a8597e94b157d9c03d5928c45f5258a89111b3a0bae39dd4b79888ebb1446b0a21cf194a7c068786f175165e7d7dbb0ce4085e58655328d37ef559334dd743e86c1f16adb72ec37bd1f436bdb161d7d71d44c79d15722ca408e616472d18fe50604241fe02301b06da481256c3398c60d7fa1ab451e7a52088ead4852c9c7711e0a76d42684d13a09446712b67e9357116b0786"]}, 0x180}, {&(0x7f0000000400)={0x20, 0x1f, 0x100, 0x70bd2c, 0x25dfdbfe, "", [@typed={0x8, 0x4c, @pid=r2}, @typed={0x8, 0x80, @u32=0x7}]}, 0x20}, {&(0x7f0000000440)={0x100, 0x16, 0x300, 0x70bd2a, 0x25dfdbfe, "", [@typed={0xc, 0x49, @u64=0x24}, @nested={0x2c, 0x8, [@generic="81a83bb89a8c64150c8ffdb0ba6ae2820fc74a7845f27fd0b3b9d49940a20a7048b76ba50c"]}, @nested={0xb8, 0x6a, [@typed={0x14, 0x79, @ipv6=@ipv4={[], [], @broadcast}}, @generic="28f60530d262fc9367393d8bfbd7c02148abe9a0d3ad0930c4403fdd147dfe852b03a7d4312aeba37a6e8cf575920e2c89e6f8104825519ab5883013e76117797941cd6d2844e0530ab2dc9de733025c5b03c660687bf10dcdffbe24254e0df76a42697afa7da8a10253d763b5f77c865646021e14efb24368fa94481741b513ed0de34f0221556b71199230d29d59a921f0299733b9f83732be88ad77d711"]}]}, 0x100}], 0x4, &(0x7f0000000f00)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r15, r0]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}], 0x160, 0x8000}, 0x8851) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x10, 0xffffff50, 0x0}) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/38) 14:05:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) getsockopt(r2, 0x400, 0x6c40000000000000, &(0x7f0000000980)=""/4096, &(0x7f00000004c0)=0x1000) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dmad\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000580), 0x4) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) write$P9_RREADDIR(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="2a000002290109010000000000000000050000000000000003000000000000000007002e2f66696c653059b4fe2d27dd8bd14488ac69e0eb42e679484f7d0209eead8333caa8a5e9ccbd81bb226ca7ad8ed068a33600c1cd3c8b2a6b678c63bd"], 0x2a) r6 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_udp_int(r6, 0x11, 0xb, &(0x7f0000000500), &(0x7f0000000540)=0x4) [ 192.872043] tmpfs: No value for mount option 'ev/loop#' 14:05:24 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x0, 0x0, 0x0, 0x7, 0x1f, 0x9}, r4, 0x8, 0xffffffffffffff9c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={0x0, {}, 0x0, 0x0}, &(0x7f0000000440)={0x0, {}, 0x0, 0x0}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) shutdown(0xffffffffffffffff, 0x2) r5 = request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="e4a1"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00\x86\xa9|\xc2\xa1p\xfd\x9f\x87\xecx\xb8\xcea14)\x88\xb5~\x7fBX\x82\xb3\xf5\x12\xb3\xc9\xdf.F\xa5:\x9c9\x8a\x1f\x9a\xdc\xd8\xf4`QU\xab~\xe4\xdb\xe8\x14\xfb\x06\xec\xd1)\x9c\xb3)&\x14K\xac\xe7\xd7\x892s\x9b\x97\b\x95\xb6ulf\xcb\x12\xb6\xef\xebd\xa1', 0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000100), 0x4000) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 14:05:24 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x2, 'vxcan1\x00', 0x2}, 0x18) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000080)) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x0}) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xf) 14:05:24 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000880)=""/231, &(0x7f0000000640)=0xe7) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, &(0x7f0000000780)='./file0\x00', 0x8, 0x3) add_key$keyring(0x0, &(0x7f0000000740)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r4 = getpgid(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xc386, 0x100, 0x5, 0x3, 0x0, 0x4, 0x48a10fa9bbe388ee, 0x8, 0x7fffffff, 0x7, 0x57, 0x80000001, 0x8e2, 0x2, 0x8e40, 0x1, 0x5, 0x9, 0x5, 0xffff, 0x20, 0x0, 0x3, 0x4, 0x1, 0x9, 0x1000, 0x3, 0x6, 0x7, 0x1, 0x2083, 0x800, 0x0, 0x4, 0x7, 0x0, 0xdc9, 0x1, @perf_config_ext={0x7ff, 0x2}, 0x28080, 0x8, 0x20, 0x7, 0x1f, 0x9, 0x5}, r4, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigaction(0x0, &(0x7f0000000340)={&(0x7f0000000280)="c401792b780041dd33cfc4e16e5285e800000066450f38020966660f6c2cd1c461265aeff04481060000002199c40211af19", {}, 0x0, &(0x7f00000002c0)="c4e27d0e3500000000c48213f6b0fbffffff430f78ab89000000f042804c412702ff8e07d90000f2f046302f0f1bae87a1591ef3a5c4a17fe6b50000008045d9f7"}, &(0x7f0000000440)={&(0x7f0000000380)="8f6950014e1f36420f54dbc4a20dbfdb8f6978c11b8f885885cdf9c481ac5cc93e0ffd8bff2f027bf30f7ffcc441e55d1ac4217c118075980000", {}, 0x0, &(0x7f0000000400)="f243afc4c3d122641f1213660fe47cfd0041700cc44199d44006c463b5496f00fa66470f78c30056f3440f2cc0c4237122b5040000000d64410f0f7c81e1a7"}, 0x8, &(0x7f0000000480)) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000240)={0x7, 0x1, 0x2}, 0xc) sysinfo(&(0x7f00000007c0)=""/154) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) statfs(&(0x7f0000000500)='.\x00', &(0x7f0000000540)=""/226) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000003c0)=0xfff) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x1, 0x4, 0x0, &(0x7f0000000800)}) shutdown(0xffffffffffffffff, 0x2) request_key(&(0x7f0000000080)='.dead\x00', 0x0, &(0x7f0000000100)='\x00', 0xfffffffffffffffc) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) futimesat(r2, &(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)={{r6, r7/1000+10000}, {0x0, 0x7530}}) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0xe) write$P9_RREADDIR(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="2a03000000014b010000000000000000050000000000000003000000000000000007002e2f66696c6530"], 0x2a) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 193.058853] tmpfs: No value for mount option 'ev/loop#' [ 193.214740] ================================================================== [ 193.222234] BUG: KASAN: use-after-free in get_disk+0xc0/0xd0 [ 193.228039] Read of size 8 at addr ffff8881a165da30 by task blkid/8890 [ 193.234689] [ 193.236313] CPU: 1 PID: 8890 Comm: blkid Not tainted 4.14.93+ #6 [ 193.242445] Call Trace: [ 193.245035] dump_stack+0xb9/0x10e [ 193.248596] ? get_disk+0xc0/0xd0 [ 193.252047] print_address_description+0x60/0x226 [ 193.256881] ? get_disk+0xc0/0xd0 [ 193.260324] kasan_report.cold+0x88/0x2a5 [ 193.264478] ? get_disk+0xc0/0xd0 [ 193.267927] ? get_gendisk+0xee/0x240 [ 193.271720] ? __blkdev_get+0x345/0xe50 [ 193.275700] ? __blkdev_put+0x6d0/0x6d0 [ 193.279678] ? blkdev_get+0x97/0x8b0 [ 193.283388] ? bd_acquire+0x149/0x2c0 [ 193.287185] ? bd_may_claim+0xd0/0xd0 [ 193.290999] ? lock_downgrade+0x5d0/0x5d0 [ 193.295146] ? lock_acquire+0x10f/0x380 [ 193.299115] ? bd_acquire+0x113/0x2c0 [ 193.302926] ? blkdev_open+0x1cc/0x250 [ 193.306809] ? security_file_open+0x88/0x190 [ 193.311216] ? do_dentry_open+0x41b/0xd60 [ 193.315370] ? bd_acquire+0x2c0/0x2c0 [ 193.319170] ? vfs_open+0x105/0x230 [ 193.322792] ? path_openat+0xb6b/0x2b70 [ 193.326802] ? path_mountpoint+0x9a0/0x9a0 [ 193.331050] ? trace_hardirqs_on+0x10/0x10 [ 193.335313] ? do_filp_open+0x1a1/0x280 [ 193.339279] ? may_open_dev+0xe0/0xe0 [ 193.343085] ? lock_downgrade+0x5d0/0x5d0 [ 193.347242] ? lock_acquire+0x10f/0x380 [ 193.351218] ? __alloc_fd+0x3f/0x490 [ 193.354971] ? _raw_spin_unlock+0x29/0x40 [ 193.359132] ? __alloc_fd+0x1bf/0x490 [ 193.362938] ? do_sys_open+0x2ca/0x590 [ 193.366817] ? filp_open+0x60/0x60 [ 193.370364] ? do_syscall_64+0x43/0x4b0 [ 193.374330] ? do_sys_open+0x590/0x590 [ 193.378210] ? do_syscall_64+0x19b/0x4b0 [ 193.382297] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.387667] [ 193.389285] Allocated by task 8842: [ 193.392903] kasan_kmalloc.part.0+0x4f/0xd0 [ 193.397212] kmem_cache_alloc_trace+0x126/0x310 [ 193.401896] alloc_disk_node+0x5b/0x3d0 [ 193.405854] [ 193.407630] Freed by task 1855: [ 193.410898] kasan_slab_free+0xb0/0x190 [ 193.414858] kfree+0xf5/0x310 [ 193.417955] device_release+0xf4/0x1a0 [ 193.421829] [ 193.423449] The buggy address belongs to the object at ffff8881a165d500 [ 193.423449] which belongs to the cache kmalloc-2048 of size 2048 [ 193.436290] The buggy address is located 1328 bytes inside of [ 193.436290] 2048-byte region [ffff8881a165d500, ffff8881a165dd00) [ 193.448335] The buggy address belongs to the page: [ 193.453267] page:ffffea0006859600 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 193.463233] flags: 0x4000000000008100(slab|head) [ 193.467988] raw: 4000000000008100 0000000000000000 0000000000000000 00000001000f000f [ 193.475855] raw: ffffea00067f3400 0000000400000004 ffff8881da802800 0000000000000000 [ 193.483717] page dumped because: kasan: bad access detected [ 193.489416] [ 193.491031] Memory state around the buggy address: [ 193.495946] ffff8881a165d900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 193.503293] ffff8881a165d980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 193.510644] >ffff8881a165da00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 193.517985] ^ [ 193.522900] ffff8881a165da80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 193.530257] ffff8881a165db00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 193.537600] ================================================================== [ 193.544942] Disabling lock debugging due to kernel taint [ 193.550423] Kernel panic - not syncing: panic_on_warn set ... [ 193.550423] [ 193.557779] CPU: 1 PID: 8890 Comm: blkid Tainted: G B 4.14.93+ #6 [ 193.565124] Call Trace: [ 193.567702] dump_stack+0xb9/0x10e [ 193.571247] panic+0x1d9/0x3c2 [ 193.574435] ? add_taint.cold+0x16/0x16 [ 193.578397] ? retint_kernel+0x2d/0x2d [ 193.582282] ? get_disk+0xc0/0xd0 [ 193.585719] kasan_end_report+0x43/0x49 [ 193.589688] kasan_report.cold+0xa4/0x2a5 [ 193.593827] ? get_disk+0xc0/0xd0 [ 193.597287] ? get_gendisk+0xee/0x240 [ 193.601076] ? __blkdev_get+0x345/0xe50 [ 193.605056] ? __blkdev_put+0x6d0/0x6d0 [ 193.609037] ? blkdev_get+0x97/0x8b0 [ 193.612755] ? bd_acquire+0x149/0x2c0 [ 193.616542] ? bd_may_claim+0xd0/0xd0 [ 193.620331] ? lock_downgrade+0x5d0/0x5d0 [ 193.624486] ? lock_acquire+0x10f/0x380 [ 193.628448] ? bd_acquire+0x113/0x2c0 [ 193.632257] ? blkdev_open+0x1cc/0x250 [ 193.636138] ? security_file_open+0x88/0x190 [ 193.640549] ? do_dentry_open+0x41b/0xd60 [ 193.644686] ? bd_acquire+0x2c0/0x2c0 [ 193.648479] ? vfs_open+0x105/0x230 [ 193.652112] ? path_openat+0xb6b/0x2b70 [ 193.656094] ? path_mountpoint+0x9a0/0x9a0 [ 193.660329] ? trace_hardirqs_on+0x10/0x10 [ 193.664576] ? do_filp_open+0x1a1/0x280 [ 193.668568] ? may_open_dev+0xe0/0xe0 [ 193.672376] ? lock_downgrade+0x5d0/0x5d0 [ 193.676534] ? lock_acquire+0x10f/0x380 [ 193.680523] ? __alloc_fd+0x3f/0x490 [ 193.684258] ? _raw_spin_unlock+0x29/0x40 [ 193.688406] ? __alloc_fd+0x1bf/0x490 [ 193.692215] ? do_sys_open+0x2ca/0x590 [ 193.696118] ? filp_open+0x60/0x60 [ 193.699661] ? do_syscall_64+0x43/0x4b0 [ 193.703624] ? do_sys_open+0x590/0x590 [ 193.707503] ? do_syscall_64+0x19b/0x4b0 [ 193.711559] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.717289] Kernel Offset: 0x26e00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 193.728191] Rebooting in 86400 seconds..