[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.10' (ECDSA) to the list of known hosts. 2020/05/22 23:55:22 fuzzer started 2020/05/22 23:55:22 dialing manager at 10.128.0.105:38353 2020/05/22 23:55:23 syscalls: 3055 2020/05/22 23:55:23 code coverage: enabled 2020/05/22 23:55:23 comparison tracing: enabled 2020/05/22 23:55:23 extra coverage: enabled 2020/05/22 23:55:23 setuid sandbox: enabled 2020/05/22 23:55:23 namespace sandbox: enabled 2020/05/22 23:55:23 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/22 23:55:23 fault injection: enabled 2020/05/22 23:55:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/22 23:55:23 net packet injection: enabled 2020/05/22 23:55:23 net device setup: enabled 2020/05/22 23:55:23 concurrency sanitizer: enabled 2020/05/22 23:55:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/22 23:55:23 USB emulation: enabled syzkaller login: [ 54.832744][ T8908] KCSAN: could not find function: '_find_next_bit' 2020/05/22 23:55:28 adding functions to KCSAN blacklist: 'tick_sched_do_timer' 'generic_fillattr' '__add_to_page_cache_locked' '__snd_rawmidi_transmit_ack' 'run_timer_softirq' 'kauditd_thread' 'n_tty_receive_buf_common' 'kcm_rfree' 'mod_timer' 'do_nanosleep' 'find_get_pages_range_tag' 'find_alive_thread' 'xas_clear_mark' 'copy_process' 'ext4_mark_iloc_dirty' 'generic_file_read_iter' 'ktime_get_real_seconds' '__ext4_new_inode' 'dd_has_work' '_find_next_bit' 'blk_mq_sched_dispatch_requests' 'shmem_file_read_iter' 'blk_mq_dispatch_rq_list' 'snd_seq_check_queue' 'add_timer' 'generic_write_end' 'do_signal_stop' 'page_counter_charge' 'echo_char' 'ep_poll' 'ext4_free_inodes_count' 'pcpu_alloc' 'tick_nohz_idle_stop_tick' '__process_echoes' 'lruvec_lru_size' 23:59:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000280)=""/76, 0xff0d}], 0x1, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x0, &(0x7f0000000280)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r1, r2, 0x0, 0x800000080004102) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 288.673382][ T8910] IPVS: ftp: loaded support on port[0] = 21 23:59:20 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "209200", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x4, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0xc2, 0x0, 0x0, 0x25c8, {[@generic={0x3, 0x2}, @exp_fastopen={0xfe, 0x4}, @sack_perm={0x4, 0x2}, @nop]}}}}}}}}, 0x0) [ 288.757805][ T8910] chnl_net:caif_netlink_parms(): no params data found [ 288.816733][ T8910] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.824511][ T8910] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.833965][ T8910] device bridge_slave_0 entered promiscuous mode [ 288.843280][ T8910] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.850340][ T8910] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.858713][ T8910] device bridge_slave_1 entered promiscuous mode [ 288.878888][ T8910] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.890238][ T8910] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.913580][ T8910] team0: Port device team_slave_0 added [ 288.921045][ T8910] team0: Port device team_slave_1 added [ 288.938744][ T8910] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 288.946195][ T8910] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 288.984673][ T8910] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 288.998157][ T8910] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 289.006033][ T8910] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.033309][ T8910] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 23:59:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x4000000) [ 289.060948][ T9064] IPVS: ftp: loaded support on port[0] = 21 [ 289.084101][ T8910] device hsr_slave_0 entered promiscuous mode [ 289.142818][ T8910] device hsr_slave_1 entered promiscuous mode [ 289.276689][ T9104] IPVS: ftp: loaded support on port[0] = 21 [ 289.331783][ T8910] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 289.376342][ T8910] netdevsim netdevsim0 netdevsim1: renamed from eth1 23:59:21 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x0, 0x0, 0x102, 0x8000003}, 0x20) [ 289.445807][ T8910] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 289.520287][ T9064] chnl_net:caif_netlink_parms(): no params data found [ 289.534004][ T8910] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 289.621179][ T9236] IPVS: ftp: loaded support on port[0] = 21 [ 289.666757][ T8910] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.673828][ T8910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.681213][ T8910] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.688310][ T8910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.713350][ T9104] chnl_net:caif_netlink_parms(): no params data found 23:59:21 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x0, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) [ 289.784078][ T4143] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.793222][ T4143] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.803523][ T9064] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.810545][ T9064] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.819026][ T9064] device bridge_slave_0 entered promiscuous mode [ 289.844978][ T9064] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.862216][ T9064] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.882017][ T9064] device bridge_slave_1 entered promiscuous mode [ 289.943337][ T9104] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.950383][ T9104] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.974584][ T9104] device bridge_slave_0 entered promiscuous mode [ 289.996927][ T9236] chnl_net:caif_netlink_parms(): no params data found [ 290.021859][ T9447] IPVS: ftp: loaded support on port[0] = 21 [ 290.029289][ T9064] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 290.040669][ T9104] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.050512][ T9104] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.064957][ T9104] device bridge_slave_1 entered promiscuous mode [ 290.074893][ T8910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.089300][ T9064] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 23:59:21 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @dev}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x83, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff0200000000000000000000000000014e234e20004d90"], 0x0) [ 290.145814][ T8910] 8021q: adding VLAN 0 to HW filter on device team0 [ 290.169088][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 290.178230][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 290.188081][ T9104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 290.212432][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 290.221091][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 290.234757][ T4143] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.241806][ T4143] bridge0: port 1(bridge_slave_0) entered forwarding state [ 290.249899][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.258662][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.267435][ T4143] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.274477][ T4143] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.298086][ T9064] team0: Port device team_slave_0 added [ 290.306056][ T9064] team0: Port device team_slave_1 added [ 290.315688][ T9104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 290.335334][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.345213][ T9236] bridge0: port 1(bridge_slave_0) entered blocking state [ 290.353771][ T9236] bridge0: port 1(bridge_slave_0) entered disabled state [ 290.361449][ T9236] device bridge_slave_0 entered promiscuous mode [ 290.380925][ T9064] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 290.388544][ T9064] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.416473][ T9064] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 290.428457][ T9104] team0: Port device team_slave_0 added [ 290.435648][ T9064] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 290.442654][ T9064] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.468856][ T9064] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 290.479853][ T9236] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.488473][ T9236] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.496830][ T9236] device bridge_slave_1 entered promiscuous mode [ 290.508670][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.526750][ T9542] IPVS: ftp: loaded support on port[0] = 21 [ 290.540626][ T9104] team0: Port device team_slave_1 added [ 290.572585][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.581226][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.590853][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.599992][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.608993][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.617545][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 290.626405][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.642156][ T9104] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 290.649124][ T9104] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.676735][ T9104] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 290.692151][ T9104] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 290.699128][ T9104] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 290.725354][ T9104] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 290.737243][ T9236] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 290.749494][ T9236] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 290.834082][ T9064] device hsr_slave_0 entered promiscuous mode [ 290.902335][ T9064] device hsr_slave_1 entered promiscuous mode [ 290.942150][ T9064] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 290.949849][ T9064] Cannot create hsr debugfs directory [ 290.960774][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 290.969660][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 290.988883][ T9447] chnl_net:caif_netlink_parms(): no params data found [ 291.017028][ T8910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 291.026899][ T9236] team0: Port device team_slave_0 added [ 291.094368][ T9104] device hsr_slave_0 entered promiscuous mode [ 291.152272][ T9104] device hsr_slave_1 entered promiscuous mode [ 291.191977][ T9104] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 291.199595][ T9104] Cannot create hsr debugfs directory [ 291.208843][ T9236] team0: Port device team_slave_1 added [ 291.231722][ T9447] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.239135][ T9447] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.246944][ T9447] device bridge_slave_0 entered promiscuous mode [ 291.284773][ T9236] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 291.291722][ T9236] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.320362][ T9236] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 291.338090][ T9447] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.346401][ T9447] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.354437][ T9447] device bridge_slave_1 entered promiscuous mode [ 291.368687][ T9236] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 291.376973][ T9236] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 291.403346][ T9236] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 291.415778][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 291.423235][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 291.439665][ T8910] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 291.513912][ T9236] device hsr_slave_0 entered promiscuous mode [ 291.532487][ T9236] device hsr_slave_1 entered promiscuous mode [ 291.582074][ T9236] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 291.589638][ T9236] Cannot create hsr debugfs directory [ 291.599391][ T9447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.624734][ T9542] chnl_net:caif_netlink_parms(): no params data found [ 291.637320][ T9447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.671794][ T9064] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 291.734274][ T9064] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 291.814946][ T9064] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 291.857228][ T9447] team0: Port device team_slave_0 added [ 291.866391][ T9447] team0: Port device team_slave_1 added [ 291.874676][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 291.883775][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 291.899442][ T9104] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 291.945204][ T9104] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 292.004693][ T9104] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 292.055023][ T9064] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 292.102378][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 292.110588][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 292.121380][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 292.129948][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 292.139534][ T9104] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 292.213806][ T9447] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 292.220809][ T9447] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 292.247772][ T9447] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 292.264954][ T8910] device veth0_vlan entered promiscuous mode [ 292.279554][ T9447] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 292.287277][ T9447] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 292.313875][ T9447] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 292.358915][ T9542] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.366502][ T9542] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.374920][ T9542] device bridge_slave_0 entered promiscuous mode [ 292.424001][ T9447] device hsr_slave_0 entered promiscuous mode [ 292.462382][ T9447] device hsr_slave_1 entered promiscuous mode [ 292.501956][ T9447] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 292.509687][ T9447] Cannot create hsr debugfs directory [ 292.525417][ T9542] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.534292][ T9542] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.542698][ T9542] device bridge_slave_1 entered promiscuous mode [ 292.582555][ T9236] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 292.604869][ T9236] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 292.669052][ T9236] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 292.744534][ T9236] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 292.764236][ T8910] device veth1_vlan entered promiscuous mode [ 292.783802][ T9542] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 292.832996][ T9542] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 292.869887][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 292.879205][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 292.903757][ T9104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.910908][ T9447] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 292.954507][ T9542] team0: Port device team_slave_0 added [ 292.960264][ T9447] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 293.014436][ T8910] device veth0_macvtap entered promiscuous mode [ 293.033934][ T9064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 293.041757][ T9542] team0: Port device team_slave_1 added [ 293.052019][ T9447] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 293.084384][ T9447] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 293.136131][ T8910] device veth1_macvtap entered promiscuous mode [ 293.151232][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 293.161616][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 293.170391][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.178649][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.203696][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.211726][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.220291][ T9542] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 293.227401][ T9542] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.253926][ T9542] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 293.266221][ T9104] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.274114][ T9542] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 293.281142][ T9542] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 293.307646][ T9542] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 293.326029][ T8910] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 293.348740][ T9064] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.357885][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 293.369477][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 293.378537][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.387395][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.396283][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.403342][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.412712][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.427483][ T8910] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 293.493816][ T9542] device hsr_slave_0 entered promiscuous mode [ 293.532210][ T9542] device hsr_slave_1 entered promiscuous mode [ 293.571911][ T9542] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 293.579515][ T9542] Cannot create hsr debugfs directory [ 293.606604][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.616005][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.624938][ T5268] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.632060][ T5268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.639881][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.648902][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 293.657589][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.666355][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.677903][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.686905][ T5268] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.693962][ T5268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.701650][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.710422][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 293.719042][ T5268] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.726140][ T5268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.739750][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 293.818285][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.829165][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.839201][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.849188][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.858729][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.867714][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.876553][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.885257][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.893724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.902745][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.911127][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.919823][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.928350][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.998131][ T9104] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 294.009467][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.017887][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.026213][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.034691][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.043260][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.101548][ T9236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.140839][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.149942][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.172544][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.173013][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.217204][ T9064] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.226355][ T9542] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 294.284313][ T9542] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 294.314880][ T9542] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 294.344750][ T9542] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 294.391867][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.392010][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.392103][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.392371][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.395890][ T9236] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.412043][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.412627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.413078][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.413090][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.413724][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.417851][ T9104] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.437559][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.438078][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.438443][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.438455][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.438851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.438967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.449796][ T9447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.571839][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 294.572977][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 294.577102][ T9064] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 294.610884][ T9447] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.613559][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 294.614047][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.614544][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.615142][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.616030][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.616710][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.645439][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.646207][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 294.646863][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 294.647418][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 294.648020][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 294.648787][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 294.649304][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 294.659390][ T9104] device veth0_vlan entered promiscuous mode [ 294.662327][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 294.663260][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.664525][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.665041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.675354][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.675714][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.675985][ T9328] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.675999][ T9328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.677458][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.677959][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 294.678412][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 294.681282][ T9236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.711166][ T9104] device veth1_vlan entered promiscuous mode [ 294.711834][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 294.712401][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.713019][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.713302][ T9328] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.713313][ T9328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.740752][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 294.960995][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 294.961688][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 294.962568][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.978203][ T9064] device veth0_vlan entered promiscuous mode [ 294.979206][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.980452][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.981012][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 294.981100][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 294.981231][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 294.982881][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 294.983914][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 294.984823][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 294.985441][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 294.995926][ T9542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.006690][ T9236] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.016818][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.017590][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.018242][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.018949][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.019419][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.021522][ T9104] device veth0_macvtap entered promiscuous mode [ 295.026309][ T9104] device veth1_macvtap entered promiscuous mode [ 295.038610][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 295.207111][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 295.207710][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.208362][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.224679][ T9064] device veth1_vlan entered promiscuous mode [ 295.239173][ T9104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 295.239180][ T9104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.240362][ T9104] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 295.253175][ T9447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 295.323577][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 295.324081][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 295.324589][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 295.325324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 295.333806][ T9104] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 295.333814][ T9104] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.334657][ T9104] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 295.336956][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.337519][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.338107][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 295.338696][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 295.347683][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 295.348462][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.348954][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.349687][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.358525][ T9542] 8021q: adding VLAN 0 to HW filter on device team0 23:59:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x52, &(0x7f0000000000)={@multicast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0xb, 0x3a, 0x0, @private2, @mcast2, {[], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @mcast2}}}}}}, 0x0) [ 295.512930][ T9064] device veth0_macvtap entered promiscuous mode [ 295.522620][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 295.543436][ T9064] device veth1_macvtap entered promiscuous mode [ 295.557299][ T9236] device veth0_vlan entered promiscuous mode [ 295.642758][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.653144][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.661847][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.670847][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.679189][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.686482][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.716514][ T9064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 295.727214][ T9064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 295.737962][ T9064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 295.749091][ T9064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:59:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)={r4, 0x0, 0x2, r4}) dup3(r3, r1, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x73ec7}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x0, 0x7}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70}}) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 295.760539][ T9064] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 295.815881][T10181] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 295.833063][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.845234][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.861873][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.881865][T10181] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 295.882433][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.902039][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.911113][ T9577] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.918171][ T9577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.936169][T10188] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 295.944779][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.973213][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.987481][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.995708][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.003480][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.024896][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.048520][ T9447] 8021q: adding VLAN 0 to HW filter on device batadv0 23:59:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = eventfd(0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)={r4, 0x0, 0x2, r4}) dup3(r3, r1, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000100)={[], 0x0, 0x73ec7}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x0, 0x7}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000700)={0x0, 0x0, @pic={0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70}}) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 296.083800][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 296.101551][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 296.122929][ T9064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:59:27 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)}) [ 296.170252][ T9064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 296.200209][ T9064] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 296.219864][T10206] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 296.228388][ T9064] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 296.253580][ T9064] batman_adv: batadv0: Interface activated: batadv_slave_1 23:59:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x6, 0x1, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000340)="054a3bb5e338", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 296.272215][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.283580][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 296.312515][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.344197][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 23:59:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0xf8d8}, 0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 296.356234][ T9577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.367902][ T9236] device veth1_vlan entered promiscuous mode [ 296.398626][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready 23:59:28 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') socket$unix(0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) [ 296.417479][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.445614][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.507374][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 296.532310][ C0] hrtimer: interrupt took 25775 ns [ 296.539204][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.576083][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.599605][ T9542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.691542][ T9236] device veth0_macvtap entered promiscuous mode [ 296.836077][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 296.862092][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.870851][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 296.942539][ T9328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 296.954015][ T9236] device veth1_macvtap entered promiscuous mode [ 297.057859][ T9542] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 297.076406][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 297.087177][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 297.095328][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 297.103501][ T4143] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 297.126287][ T9447] device veth0_vlan entered promiscuous mode [ 297.140827][T10237] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 297.157768][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.167228][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.179374][ T9236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.195113][ T9236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.206097][ T9236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.219631][ T9236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.230021][ T9236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.240773][ T9236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.252297][ T9236] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 297.265393][ T9236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.276102][ T9236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.294865][ T9236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:59:28 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) pipe(0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000340)="054a3bb5e3382ba0f4bd92cebb4cd68334656099dff380034dfdb2341d1d38319c", 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) 23:59:28 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0xfffffffffffffffc, 0x6, 0x1, @scatter={0x2, 0x2000, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}, {0x0}]}, &(0x7f0000000340)="054a3bb5e338", &(0x7f0000000140)=""/94, 0x0, 0x0, 0x0, 0x0}) [ 297.298404][T10237] syz-executor.1 (10237) used greatest stack depth: 10416 bytes left [ 297.306421][ T9236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.360937][ T9236] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 297.381741][ T9236] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.412988][ T9236] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 297.420386][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.463649][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.477942][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 297.493726][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 297.503311][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 297.514720][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 297.531409][ T9447] device veth1_vlan entered promiscuous mode [ 297.714766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 297.723053][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 297.731538][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 297.744060][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 297.760680][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 297.770973][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 297.785124][ T9447] device veth0_macvtap entered promiscuous mode [ 297.800445][ T9542] device veth0_vlan entered promiscuous mode 23:59:29 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) [ 297.814359][ T9447] device veth1_macvtap entered promiscuous mode [ 297.826546][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 297.836327][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 297.848863][T10179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 297.876227][ T9542] device veth1_vlan entered promiscuous mode [ 297.889417][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 297.898852][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.910943][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 297.940881][ T9447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.958322][ T9447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.969077][ T9447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 297.980505][ T9447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 297.990895][ T9447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.001881][ T9447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.012389][ T9447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.023305][ T9447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.034985][ T9447] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 298.045679][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 298.055654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.071256][ T9447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 298.082734][ T9447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.092756][ T9447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 298.103278][ T9447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.113352][ T9447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 298.123895][ T9447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.133748][ T9447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 298.144548][ T9447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.155691][ T9447] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 298.173058][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 298.181091][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 298.189985][ T5268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 298.208139][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 298.216798][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 298.230982][ T9542] device veth0_macvtap entered promiscuous mode [ 298.275800][ T9542] device veth1_macvtap entered promiscuous mode [ 298.418249][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.429124][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.442358][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.455374][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.467848][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.480742][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.493694][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.505489][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.518340][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 298.529497][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.543932][ T9542] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 298.553289][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 298.561235][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 298.570198][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 298.579321][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 298.592289][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 298.602807][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.612801][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 298.623267][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.634146][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 298.644876][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.655433][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 298.665882][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.675926][ T9542] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 298.686366][ T9542] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 298.697403][ T9542] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 298.709698][ T9559] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 298.719773][ T9559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:59:30 executing program 4: io_setup(0x5, &(0x7f0000000180)) 23:59:30 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) 23:59:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0xf8d8}, 0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) pipe(0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000340)="054a3bb5e3382ba0f4bd92cebb4cd68334656099dff380034dfdb2341d1d38319c", &(0x7f0000000140)=""/94, 0x0, 0x0, 0x0, 0x0}) socket$netlink(0x10, 0x3, 0x0) 23:59:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x6, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0xffa8) 23:59:30 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) 23:59:30 executing program 4: socket$inet6(0xa, 0x80003, 0xff) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ah\x00'}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10080, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x84200, 0x0) r0 = openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) recvfrom$inet6(r0, &(0x7f00000002c0)=""/188, 0xbc, 0x1, &(0x7f0000000040)={0xa, 0x4e21, 0x41a, @ipv4={[], [], @remote}, 0x9}, 0x1c) r1 = semget$private(0x0, 0x0, 0x601) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000100)=""/16) r2 = socket$inet(0x2, 0x1, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r3, r4}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) keyctl$KEYCTL_MOVE(0x1e, 0x0, r4, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x24004850, &(0x7f0000000280)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='veth1_virt_wifi\x00', 0x10) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 299.038428][ C1] sd 0:0:1:0: [sg0] tag#5141 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 299.048829][ C1] sd 0:0:1:0: [sg0] tag#5141 CDB: Read Block Limits [ 299.055473][ C1] sd 0:0:1:0: [sg0] tag#5141 CDB[00]: 05 4a 3b b5 e3 38 2b a0 f4 bd 92 ce bb 4c d6 83 [ 299.065070][ C1] sd 0:0:1:0: [sg0] tag#5141 CDB[10]: 34 65 60 99 df f3 80 03 4d fd b2 34 1d 1d 38 31 [ 299.074644][ C1] sd 0:0:1:0: [sg0] tag#5141 CDB[20]: 9c 23:59:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(0xffffffffffffffff) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000005c0)=[{0x0}, {&(0x7f00000002c0)="7a9bfcdd68168f4d7e321ecb5b9a8151495a21984abe8c2725175cd89f8d19a5136bb600daa520ebee792bfa16e84918d3a01e750d43333da50d657a1a70356a3edcee49ea8ba857a8e258c004239e94b2fa87b5a29d4060ccafaf686832ab145b54b136f3a202c53552c7459322ec6aab91666568c08e082d464b7fa6d663aa51", 0x81, 0x4}], 0x200400, &(0x7f0000000680)='security\x00') 23:59:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) [ 299.518915][T10306] nfs: Unknown parameter 'security' [ 299.653093][T10311] nfs: Unknown parameter 'security' 23:59:31 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000240)={0x53, 0x0, 0x6, 0x0, @scatter={0x2, 0x300, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/160, 0xa0}, {0x0, 0x7ffffffff000}]}, &(0x7f0000000340)="054a3bb5e338", 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}) 23:59:31 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) [ 299.864099][T10321] hfs: umask requires a value 23:59:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x80, &(0x7f0000000180)="77e559a5a65f1d440b79f9e5d7af2efe0fcb598e1b53b51b139c2a6cc84f988fe8b26d79c31240aa6a09f5ddb729d6e03bbfcba4429ddfb2798507905b2f425e27d60ece70d0b0c7907bdc42ad999e0650de923e000e1c810bbc80b280d01df91fce36905229038fd28564a9b8b3e066cba670e762fa18319297aa8ddc0fe7e3fd13d784233fd7ef446ee1be8b96c511e3b7792e9273936053") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80}}}, 0xb8}}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000040)={{0x77359400}, {r2, r3/1000+60000}}, 0x0) [ 299.892690][T10321] hfs: unable to parse mount options 23:59:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0xf8d8}, 0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000000)={0x3, 0xa, 0x4, 0x10000, 0x5, {0x77359400}, {0x1, 0x0, 0x2, 0x20, 0xb0, 0x7f, "9cd30583"}, 0x1, 0x2, @userptr=0xfffffffffffffffb, 0x685, 0x0, r0}) setsockopt$packet_buf(r1, 0x107, 0x17, &(0x7f0000000180)="b41822c5c5e5aea01f735c4f8da6266f9e5857463b3f1d62fb58d2f3a229ca76ba4b04184322e0cddaaaa21dc5042e256d7809cec39d7273cbb1ba3e6d0db0e5b1845d6bf287e3d97c4c55635e3f03802a031743bd1f2bbfee151bb63233a7a6a95e7da0b4ab4b89b10241515a49bdb259502ae200c359c084a2b71c96aa9a27af36cfbd67008b7904dff40207a694a5102f02322f8e5b87386d192c3f5742f3f4cc4ea993d95f8fa73ec44091aa46df57d1da578d6499bd06e234d08d919866221d6dd6306328807c0413e4", 0xcc) getpid() r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f00000000c0)='wg1\x00', 0x4) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f00000038c0), 0x4000000000000a8, 0x0) 23:59:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) [ 300.333274][T10342] hfs: umask requires a value [ 300.392531][T10342] hfs: unable to parse mount options 23:59:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r1, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x3, 0x1, 0x0, 0x2000, &(0x7f0000019000/0x2000)=nil}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000017000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SMI(r6, 0xaeb7) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = dup(r6) write$UHID_INPUT(r7, &(0x7f0000001440)={0x8, {"a2e3ad9bed6b52f99cfbf4c087f719b4d04fe7ff7fc6e5539b366e0e8b546a1b5d5294370890e0878fdb1ac6e7049b41b4956c409a472a5b67f3988f7ef31952a981ffe8d178708c523c921b1b284b0a169b71d336cd3b78130daa61d8e809ea882f5802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f309f4cff7738596ecae8707ce065cd5b91cd0ae193973735b36d5b1b63e91c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000000000075271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecd03aded6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1f416e56c71b1931870262f5e801119242ca5b6bfc821e7e7daf2451138e645bb80c617669314e2fbe70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d546a40b9f6ff14ac488ec130fb3850a27afc953854a642c57519544ae15a7e454dea05918b4124351601611c8f11baa500a3621c56cea8d20ff911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6a62fa678ca14ffd9f9db2a7869d85864056526f889af43a60560a22f1fca567e65d5e880572286522449df466c632b3570243f989cce3803f465e41e610c20d80421d653a5120000008213b704c7fb082ff27590678ef9f190bae979babc7041d860420c5664ba7921b14dc1db8892fd32d0ad7bc946813591ad8deff4b05f60cea0da7710ac0000000000008000bea37ce0d0d4aa202fef5952a5391fd5615d429a04a689b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2f05dd3318271a1f5f8528f227e79c1388dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eefc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5325928974d12dad99dac44c3f0008047096a44060bebc2420aed92fa9b6578b4779415d97b9a6d6d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2aed9e53803ed0ca4ae3a9737d214060005ea6f1783e287b3bee96e3a7288afe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f48fe4eae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e67d1d7232f17696294378ce716dacfc5e3e03cf7ab8e3902f1b0ff034ef655b253ca509383815b1b6fc6522d4e4fdc11a48cf42d48604675fde2b94cf02b98a269b891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efedfd71af9444e197f47e866101496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441a34cb51682a8ae4d24ad0465f7927f889b813076038e79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827945e020c1f67ee615f7084a607a7eceb6243378e0610060f02cca4051c2f001edb3d78fb4b55668dda93aec92a5de203717aa49c2d284acfabe262fccfcbb2b75a2183c4e15a7b6eb65ca8104e1b4da1fbb77ab2fc043aead87c32ab875ee7c2e7b7019c902cd3b43eaeb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e94265c803b35ee5f83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad948741b2044642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd73643de50e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c1023bf70cc77737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebdbe8ddbd75c2f998d8ac2dfad2ba3a504767b6b45a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c48b75c0f73c497579773767075428067e7f16f4dde374f8211fef42cb468e623daf60b3569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40426db6fe29068c0ca3d3414442e863a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035153faf46366e7205dd8d6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae44369ddb4581c55925d0f6f1ba471eba281f259152f85a654fb39ddff3b484439ff158e7c5419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a39973132f02768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b40517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaee5ee6cf1d0ab378dd4dd891e937c2ea5410e05130935e00785ec27e923911fab964c271556527697b52160687461602f88df165d884b36ec2b6c25a2f33c715687e9ddbfb96d6861aca47da73d6f3144345f48843dd014e5c5ad8fe995754bd9cf32fce1e7027132f2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afae5336651b1b9bd522d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a3766d5439020484f4113c4c859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee29165895ac4b008e595f437491d87abed02cefcd9db53d94d02dae17b118e5d6787463181f4b87c10772d2b13f7809959bc048850613d17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76d57227ffff2de20a4b8e3737fbb42913777c06376f799eba367e21f94ca598705f5dcb767d6f84fad6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b3110b932a4d02da711b757fe43c06d21e35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc238a081ff58cefcce3fbf4625a7e7de40e42e07b34449e15e065cc7348663a52190202c7af288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf5d77cd7007ad1519ad5470de3dd6d6080cafccf8a97406bb6b68a1f0c4549820a73c880f475f732ae00398e8bd1f4908b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cb0b3e35cb80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c60edddab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf652f406c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcbb1575912d5ecd36dea3bca0b7427d8392c6289455e8f8d2ab2242729251ae033a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f14c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec014508e5247d33ae6c962d35603ff8454c16f8342856935125102bb784ed714887071f3d998efdd9923c954ab6ce431b63ee356b0c785f2f47b90e29389f22fc5b59a70efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee658e4cb5e930ed624806c43a006dc9336d07c2b8081c128ad2706f48261f7897084c297a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da3932ba5c04c24a560ad80a3ce654578376e599aff3565b1d531f30912b99e6619ebe93cc0b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b704c971d90195c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e6491953264d2700c838fa2c7b34252600c9654e502dcea39cb6bc3eb69992e234b4ca7db2f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36d7d3e5db21b094b8b77940b5f07722e47a08d367e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c68cc164b0a0780d971a96ea2c4d4ca0398c2235980a9307b3d5bd3b010a3ad0a5dbed2881a9700af561ac8c7e36bb2fc4c40e9cf96f06817fb903729a7db6ff957697c9ede7885d94ff1aa70826ad01a9b03c37b0969be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c148cd2f9c55f4901203a9a8a2c3e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0fc5a752f9000", 0x1000}}, 0x1006) 23:59:32 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) [ 300.843373][T10353] hfs: umask requires a value [ 300.929614][T10353] hfs: unable to parse mount options 23:59:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:32 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) 23:59:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000200)=[{}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0xf8d8}, 0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:32 executing program 4: socket$inet6(0xa, 0x80003, 0xff) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ah\x00'}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10080, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x84200, 0x0) r0 = openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) recvfrom$inet6(r0, &(0x7f00000002c0)=""/188, 0xbc, 0x1, &(0x7f0000000040)={0xa, 0x4e21, 0x41a, @ipv4={[], [], @remote}, 0x9}, 0x1c) r1 = semget$private(0x0, 0x0, 0x601) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000100)=""/16) r2 = socket$inet(0x2, 0x1, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r3, r4}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) keyctl$KEYCTL_MOVE(0x1e, 0x0, r4, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x24004850, &(0x7f0000000280)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='veth1_virt_wifi\x00', 0x10) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 23:59:32 executing program 0: socket$inet6(0xa, 0x80003, 0xff) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ah\x00'}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10080, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x84200, 0x0) r0 = openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) recvfrom$inet6(r0, &(0x7f00000002c0)=""/188, 0xbc, 0x1, &(0x7f0000000040)={0xa, 0x4e21, 0x41a, @ipv4={[], [], @remote}, 0x9}, 0x1c) r1 = semget$private(0x0, 0x0, 0x601) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000100)=""/16) r2 = socket$inet(0x2, 0x1, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r3, r4}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) keyctl$KEYCTL_MOVE(0x1e, 0x0, r4, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x24004850, &(0x7f0000000280)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='veth1_virt_wifi\x00', 0x10) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) [ 301.383116][T10378] hfs: umask requires a value [ 301.387823][T10378] hfs: unable to parse mount options 23:59:33 executing program 1: getpid() capget(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0x40008, 0x3, 0x0, 0x0, 0x9, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000240), 0x80000ffffffff, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e24, @broadcast}}}, 0xa0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) r2 = dup3(r1, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x1}, 0xc) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000140), 0x4) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}, 0x2}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100), 0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x3f, 0x30, 0x8, 0x80000001}, &(0x7f0000000080)=0x18) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(0xffffffffffffffff, 0x600004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 23:59:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) [ 301.829176][T10401] hfs: umask requires a value [ 301.863966][T10401] hfs: unable to parse mount options 23:59:33 executing program 1: socket$inet6(0xa, 0x80003, 0xff) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000140)={'ah\x00'}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x10080, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x84200, 0x0) r0 = openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) recvfrom$inet6(r0, &(0x7f00000002c0)=""/188, 0xbc, 0x1, &(0x7f0000000040)={0xa, 0x4e21, 0x41a, @ipv4={[], [], @remote}, 0x9}, 0x1c) r1 = semget$private(0x0, 0x0, 0x601) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000100)=""/16) r2 = socket$inet(0x2, 0x1, 0x0) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r3, r4}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) keyctl$KEYCTL_MOVE(0x1e, 0x0, r4, 0x0, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x24004850, &(0x7f0000000280)={0x2, 0x4e23, @empty}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='veth1_virt_wifi\x00', 0x10) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 23:59:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:33 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0) [ 302.177027][T10415] hfs: umask requires a value [ 302.190710][T10415] hfs: unable to parse mount options 23:59:33 executing program 2: getpid() capget(0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000180), 0x9}, 0x40008, 0x3, 0x0, 0x0, 0x9, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80000, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000300)={0x16, 0x98, 0xfa00, {&(0x7f0000000240), 0x80000ffffffff, 0xffffffffffffffff, 0x10, 0x1, @in={0x2, 0x4e24, @broadcast}}}, 0xa0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) r2 = dup3(r1, r0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x1}, 0xc) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000140), 0x4) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}, 0x2}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100), 0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x3f, 0x30, 0x8, 0x80000001}, &(0x7f0000000080)=0x18) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(0xffffffffffffffff, 0x600004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 23:59:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:34 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0) [ 302.465164][T10429] hfs: umask requires a value [ 302.487202][T10429] hfs: unable to parse mount options 23:59:34 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0) 23:59:34 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) [ 302.825315][T10440] hfs: umask requires a value [ 302.830078][T10440] hfs: unable to parse mount options 23:59:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000000)={0x3, 0xa, 0x4, 0x10000, 0x5, {0x77359400}, {0x1, 0x0, 0x2, 0x20, 0xb0, 0x7f, "9cd30583"}, 0x1, 0x2, @userptr=0xfffffffffffffffb, 0x685, 0x0, r0}) setsockopt$packet_buf(r1, 0x107, 0x17, &(0x7f0000000180)="b41822c5c5e5aea01f735c4f8da6266f9e5857463b3f1d62fb58d2f3a229ca76ba4b04184322e0cddaaaa21dc5042e256d7809cec39d7273cbb1ba3e6d0db0e5b1845d6bf287e3d97c4c55635e3f03802a031743bd1f2bbfee151bb63233a7a6a95e7da0b4ab4b89b10241515a49bdb259502ae200c359c084a2b71c96aa9a27af36cfbd67008b7904dff40207a694a5102f02322f8e5b87386d192c3f5742f3f4cc4ea993d95f8fa73ec44091aa46df57d1da578d6499bd06e234d08d919866221d6dd6306328807c0413e4", 0xcc) getpid() r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f00000000c0)='wg1\x00', 0x4) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f00000038c0), 0x4000000000000a8, 0x0) 23:59:34 executing program 0: keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=0xda23cba9c57bb789, 0x4) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {0x8, 0x6}, {}, {}]}, 0x4c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x0, 0x7ff, 0x0) socket(0x5, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) 23:59:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:34 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) [ 303.257571][T10451] hfs: umask requires a value [ 303.279572][T10451] hfs: unable to parse mount options 23:59:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:35 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) 23:59:35 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x6, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x340, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) writev(r0, &(0x7f0000000100)=[{&(0x7f00000004c0)='\n', 0x1}], 0x1) [ 303.421367][T10455] overlayfs: workdir and upperdir must reside under the same mount 23:59:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ftruncate(r1, 0xf29) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000300001000000000000000000000000002400010020000100090001006d706c73000000000c000280080005a807b1a4385b6d001ad55ef504000600f15edfef72984ad1554b412f06d265a18027f905f7"], 0x38}}, 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bb", 0x2, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r3, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000040)={r3, 0x3b, 0xab}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'blake2s-160-x86\x00'}}, &(0x7f0000000200)="ac804d105dfea20f7d179ab601d12be18ead10cff9f69c94c0fc7ae8fbc0849bbd982e4fdfc5032ba14981b09f15bba00fb8006c01451a31d817bf", &(0x7f0000000340)=""/171) sendfile(r2, r1, 0x0, 0x100000001) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x200200, 0x0) [ 303.537156][T10465] hfs: umask requires a value [ 303.563510][T10465] hfs: unable to parse mount options 23:59:35 executing program 0: keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)=0xda23cba9c57bb789, 0x4) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [], {}, [{}, {}, {0x8, 0x6}, {}, {}]}, 0x4c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x0, 0x7ff, 0x0) socket(0x5, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x202002) 23:59:35 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0) 23:59:35 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x1}}, 0x20000000) socket$nl_netfilter(0x10, 0x3, 0xc) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r6, 0x0, 0x8) [ 303.743977][ T27] audit: type=1804 audit(1590191975.345:2): pid=10479 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir133959704/syzkaller.QmprEx/5/cgroup.controllers" dev="sda1" ino=15813 res=1 23:59:35 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 303.850384][T10490] hfs: umask requires a value 23:59:35 executing program 1: getresuid(&(0x7f0000002380), &(0x7f00000023c0), &(0x7f0000002400)=0x0) syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f00000003c0)='./file0\x00', 0x9, 0x5, &(0x7f0000002300)=[{0x0, 0x0, 0x9}, {&(0x7f0000002080)="fdad5a5d77e050204db6e0b652e0d17e3e53759def93b2479917b26fd0d3b76d2b901534ef7b63fed762470997e04d008a948f736b166c6a79faef62a43ccabd715b6b0b0907e4b1a3d3122c568922977722399b20fe09362d9d4d2c8d81dfc824bb0c43968eb96c3b2c5995bf8f90e5323843a81d5453bdc0bb506ce3ff291c919d997fc4da445ab48fc43b875f6a2da5444ae2beb02b99e6e3de96706e78999e51e65340dcff2f086797dee1155d552fdc1b039c1af8c4456a3d014368d026fb38174ad638e4674ec3cff717c6d53aa4b424fb51d7446f", 0xd8, 0x4}, {&(0x7f0000002180)="0cf3480371732870e1d9110941a5a5dd23495b49217b66953da6acdb956754a897559c4492bb7fd5fc3b432cb00924b09b8611f331d7b6147b2666752f551d38eaba51bcede9c83e1d792274e714755f7b0486aca1ba47cafc0bf3ce03fa79c74a3379cebc56fb6dd08d7455baa6b49bc6a8201f1bac2592b9308249765de0259b849da065f6b771063437c2bb9a206a1f5f6a65964451ba6ef87d2a2b2f7417e686fa052af16f36f6a3f10ccc0f4cb8b93627976afccb1c41a4abc78d3cc77ffa67a77766f2c87d33f9320aae3c407294874c588cd25a0e57e41db71e076a6f05da40a45b0bbd24097eab216da31ee90b0cd649038b", 0xf6, 0x80000000}, {&(0x7f0000000400)="651777b8dd0821d3edf4220dc8ba4b4e70a58c6fc7b2b8b4633b6cb02652c9b7de0b78562d801cc1adb869de7bd83ec6192d60d2f6bc1f694555989fcdfd20e9a1252da53caa3de543ec5ed7d5de28ab96b8fe983c0b4db694d9ee458613bcfa2a609c421d81c8c2be1bb728d345aa727489fd786c6a544cdc1f165144a6405f8c9974027d96fbfc46df7010399b562f5f63effa3a90f8", 0x97, 0x40}, {&(0x7f0000002280)="8e96b0759f5411a84f91d04086c20c7d75a27a166d71415dd9aff09253b008d9092a14a233a172e07cc014b7d71e165e5ef61ca1429864fbffabd0465f972f1b089650948fee1a8cc749833db277ad9750a1", 0x52}], 0x1, &(0x7f0000002440)={[{@uni_xlateno='uni_xlate=0'}, {@uni_xlateno='uni_xlate=0'}, {@shortname_mixed='shortname=mixed'}, {@utf8no='utf8=0'}, {@fat=@flush='flush'}, {@uni_xlate='uni_xlate=1'}, {@utf8no='utf8=0'}], [{@appraise='appraise'}, {@uid_lt={'uid<', r0}}, {@seclabel='seclabel'}]}) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f00000004c0)='./file0\x00', 0x506a, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@iocharset={'iocharset', 0x3d, 'macturkish'}}], [{@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0xc}}, {@smackfsroot={'smackfsroot', 0x3d, 'macturkish'}}, {@obj_role={'obj_role', 0x3d, 'macturkish'}}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@euid_eq={'euid', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x28}}, {@smackfsroot={'smackfsroot', 0x3d, 'user]{user'}}]}) 23:59:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ftruncate(r1, 0xf29) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000300001000000000000000000000000002400010020000100090001006d706c73000000000c000280080005a807b1a4385b6d001ad55ef504000600f15edfef72984ad1554b412f06d265a18027f905f7"], 0x38}}, 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bb", 0x2, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r3, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000040)={r3, 0x3b, 0xab}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'blake2s-160-x86\x00'}}, &(0x7f0000000200)="ac804d105dfea20f7d179ab601d12be18ead10cff9f69c94c0fc7ae8fbc0849bbd982e4fdfc5032ba14981b09f15bba00fb8006c01451a31d817bf", &(0x7f0000000340)=""/171) sendfile(r2, r1, 0x0, 0x100000001) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x200200, 0x0) [ 303.883974][T10490] hfs: unable to parse mount options 23:59:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ftruncate(r1, 0xf29) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="38000000300001000000000000000000000000002400010020000100090001006d706c73000000000c000280080005a807b1a4385b6d001ad55ef504000600f15edfef72984ad1554b412f06d265a18027f905f7"], 0x38}}, 0x0) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bb", 0x2, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r4, r3, r4}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000040)={r3, 0x3b, 0xab}, &(0x7f0000000140)={'enc=', 'raw', ' hash=', {'blake2s-160-x86\x00'}}, &(0x7f0000000200)="ac804d105dfea20f7d179ab601d12be18ead10cff9f69c94c0fc7ae8fbc0849bbd982e4fdfc5032ba14981b09f15bba00fb8006c01451a31d817bf", &(0x7f0000000340)=""/171) sendfile(r2, r1, 0x0, 0x100000001) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x200200, 0x0) 23:59:35 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) [ 304.154872][T10504] FAT-fs (loop1): Unrecognized mount option "appraise" or missing value [ 304.245167][T10514] hfs: umask requires a value [ 304.253326][T10514] hfs: unable to parse mount options [ 304.301860][ T27] audit: type=1804 audit(1590191975.905:3): pid=10517 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir133959704/syzkaller.QmprEx/6/cgroup.controllers" dev="sda1" ino=15788 res=1 23:59:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x4) r2 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYRESHEX], 0x2c}, 0x1, 0x0, 0x0, 0x24040801}, 0x4041810) sendmmsg$alg(r2, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 23:59:36 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f0000000040)={{0x3, @addr=0x101}, 0x8, 0x20, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000002000/0x18000)=nil, 0x0, 0xffffffffffffff14, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r7, 0xae9a) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$KVM_SMI(r7, 0xaeb7) ioctl$KVM_RUN(r7, 0xae80, 0x0) write$binfmt_elf64(r7, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/1118], 0x45e) getpriority(0x1, r4) 23:59:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x3) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000002c0)={0x18, r4, 0x4059f9243f11e8e3, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x18}}, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x1c0, r4, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0xd8, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xb}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xcc, 0x2, 0x0, 0x1, [{0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x9}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x40}, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(0xffffffffffffffff, 0x0, 0x0) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r6 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007940), 0x55, 0x0, 0x0) sendmmsg(r6, &(0x7f0000001500), 0x4000000000002d0, 0x0) [ 304.642558][T10523] hfs: umask requires a value [ 304.662391][T10523] hfs: unable to parse mount options 23:59:36 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:36 executing program 1: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:36 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:36 executing program 4: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 304.999030][T10539] hfs: umask requires a value [ 305.058849][T10539] hfs: unable to parse mount options 23:59:36 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:36 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:36 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:36 executing program 0: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 305.403932][T10558] hfs: umask requires a value [ 305.408630][T10558] hfs: unable to parse mount options [ 305.428993][T10559] hfs: umask requires a value [ 305.454526][T10559] hfs: unable to parse mount options 23:59:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) syz_emit_ethernet(0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:37 executing program 0: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) syz_emit_ethernet(0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:37 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:37 executing program 1: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 305.967616][T10581] hfs: umask requires a value [ 306.012809][T10581] hfs: unable to parse mount options 23:59:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) syz_emit_ethernet(0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:37 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) syz_emit_ethernet(0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 306.563702][T10604] hfs: umask requires a value [ 306.606020][T10604] hfs: unable to parse mount options 23:59:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) syz_emit_ethernet(0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:38 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:38 executing program 0: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 307.019867][T10616] hfs: umask requires a value [ 307.025339][T10616] hfs: unable to parse mount options 23:59:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) syz_emit_ethernet(0x0, 0x0, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 307.426969][T10634] hfs: umask requires a value [ 307.435735][T10633] hfs: umask requires a value [ 307.457468][T10634] hfs: unable to parse mount options [ 307.475818][T10633] hfs: unable to parse mount options 23:59:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:39 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x121402, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f00000009c0)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x5, 0xc5, &(0x7f00000001c0)=""/197, 0x41100, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080)={0x4}, 0x10, 0x0, r0}, 0x78) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x6) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4000000000400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f00000000c0)) write$P9_RMKNOD(r4, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x5757821e0cead253, 0x4, 0x6}}, 0x14) dup2(r1, r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ec0)={'macsec0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000f00)={@local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00', 0x9, 0xa07, 0x81, 0x80, 0x4, 0x400020, r7}) 23:59:39 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_SELLOADLUT(r2, 0x541c, &(0x7f0000000040)={0x5, 0x9, 0x800, 0x82, 0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000633277", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_subtree(r4, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, &(0x7f0000000140)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = accept$phonet_pipe(r7, &(0x7f0000000280), &(0x7f00000002c0)=0x10) clock_gettime(0x0, &(0x7f0000000ec0)={0x0, 0x0}) recvmmsg(r8, &(0x7f0000000dc0)=[{{&(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000300)=""/21, 0x15}, {&(0x7f0000000400)=""/177, 0xb1}, {&(0x7f00000004c0)=""/32, 0x20}, {&(0x7f0000000500)=""/37, 0x25}], 0x4, &(0x7f0000000780)=""/155, 0x9b}, 0x10000}, {{&(0x7f0000000580)=@ipx, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000840)=""/247, 0xf7}, {&(0x7f0000000940)=""/156, 0x9c}, {&(0x7f0000000a00)=""/77, 0x4d}], 0x3, &(0x7f0000000ac0)=""/54, 0x36}, 0x1}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000b00)=""/113, 0x71}], 0x1, &(0x7f0000000bc0)=""/112, 0x70}, 0xfffffffd}, {{&(0x7f0000000c40)=@nfc_llcp, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000cc0)=""/192, 0xc0}], 0x1}, 0x9}], 0x4, 0x40000002, &(0x7f0000000f00)={r9, r10+60000000}) [ 307.920263][T10648] hfs: umask requires a value [ 307.945623][T10648] hfs: unable to parse mount options 23:59:39 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x10004, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000080)={[0x0, 0x10001, 0x9, 0x0, 0x20, 0x2, 0x8, 0x93c, 0x0, 0xfffffffffffffffe, 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffffc], 0xf000, 0x10000}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xd7d5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x1000)=nil, 0x600000000003000, 0x15) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0xac90, 0x4) r6 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FICLONE(r6, 0x40049409, r3) 23:59:39 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:39 executing program 4: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:39 executing program 1: mkdir(&(0x7f0000000000)='./file0/file1\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2005000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0xd800, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) mount$overlay(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) syz_genetlink_get_family_id$nbd(0x0) mount$bpf(0x20000000, &(0x7f0000000200)='./file0/file0/file0\x00', 0x0, 0x5890, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) umount2(&(0x7f0000000040)='./file0\x00', 0x3) [ 308.331030][T10667] hfs: umask requires a value [ 308.364629][T10667] hfs: unable to parse mount options 23:59:40 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x2140022, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000440)=""/235) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) eventfd2(0x7a9, 0x80800) mkdirat(r0, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000200)={0x29, 0x6, 0x0, {0x5, 0x3}}, 0x29) renameat2(r0, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) 23:59:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:40 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYBLOB=',']) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "87dddefffd9829f91bee8a0ddd00000000003e0800000000000000002000", 0x0, 0x0, 0x0, 0x9, 0x8}) r4 = syz_open_procfs(0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000019605c61162cfa4767aebde88667cfc2d1bf777dd72033dcfd4af9921d7e6850377ac77e2de2df2846d8bd9facb09236be2bb6e0af8ced", @ANYRES16=0x0, @ANYBLOB="0000000000000000000003000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x10) r5 = socket$packet(0x11, 0x0, 0x300) dup(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 23:59:40 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540), 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe10c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x2, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x5, 0x4) creat(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = shmget(0x0, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0xd813) bind$alg(r3, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) [ 308.828182][T10687] hfs: umask requires a value [ 308.842278][T10687] hfs: unable to parse mount options 23:59:40 executing program 5: openat$ashmem(0xffffffffffffff9c, 0x0, 0x44200, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:40 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 309.043540][T10695] buggy seq_file .next function proc_keys_next did not updated position index [ 309.126322][T10708] hub 9-0:1.0: USB hub found [ 309.137511][T10708] hub 9-0:1.0: 8 ports detected 23:59:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 309.181285][T10711] buggy seq_file .next function proc_keys_next did not updated position index [ 309.244932][T10712] hfs: umask requires a value 23:59:40 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:40 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540), 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe10c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x2, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x5, 0x4) creat(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = shmget(0x0, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0xd813) bind$alg(r3, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) [ 309.290173][T10712] hfs: unable to parse mount options [ 309.371893][T10726] buggy seq_file .next function proc_keys_next did not updated position index 23:59:41 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540), 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe10c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x2, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x5, 0x4) creat(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = shmget(0x0, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0xd813) bind$alg(r3, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) 23:59:41 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000), 0x0, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540), 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000), 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe10c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e", 0x67}], 0x2, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000)=0x5, 0x4) creat(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = shmget(0x0, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r4, r3, 0x0, 0xd813) bind$alg(r3, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) 23:59:41 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYBLOB=',']) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, 0x0}, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000a80)={0x0, "87dddefffd9829f91bee8a0ddd00000000003e0800000000000000002000", 0x0, 0x0, 0x0, 0x9, 0x8}) r4 = syz_open_procfs(0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000019605c61162cfa4767aebde88667cfc2d1bf777dd72033dcfd4af9921d7e6850377ac77e2de2df2846d8bd9facb09236be2bb6e0af8ced", @ANYRES16=0x0, @ANYBLOB="0000000000000000000003000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x10) r5 = socket$packet(0x11, 0x0, 0x300) dup(r5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='ppp1\x00'}, 0x30) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) 23:59:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) [ 309.557219][T10735] hub 9-0:1.0: USB hub found [ 309.569020][T10735] hub 9-0:1.0: 8 ports detected 23:59:41 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 309.658586][T10739] hub 9-0:1.0: USB hub found [ 309.674889][T10735] buggy seq_file .next function proc_keys_next did not updated position index [ 309.685864][T10739] hub 9-0:1.0: 8 ports detected [ 309.733591][T10743] hfs: umask requires a value [ 309.770439][T10743] hfs: unable to parse mount options 23:59:41 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 309.854165][T10739] buggy seq_file .next function proc_keys_next did not updated position index 23:59:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:41 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b4000000000000006111a4000000000046000000000000009500000000000000996ac7691d60dd9bab70c0321cd2b49895d4f4e7c7eaf6936726c418d8fbc8de1cb2994c639f7581d99358fcb6d310a87cef58a501223d60b492da4878c6d7141eebde28417fa4888c06ea5c26e7f982d4"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 23:59:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000000c0)={[{@noloccookie='noloccookie'}], [{@fsname={'fsname', 0x3d, '\xa6\xb8v\x0f\x9b\xcbf\x9c\xb5\x9a\x00\xb3U\xed\xd2\x9e\xd0Y\xde\x9aD\x9cs\x1b\xa6p\x1a#\xb3\xc4\x1f\xa4d\xa8O\xc9:D\x04+\x9d\x14\x05x\xf7\xe7c&\x0fM\x82\x1d\xe1\xf8\xfd9)\xf3\xee\x8fMD\xce\x18\x16?\x96\xd4uwE\xcb\xab\x97\xe7\x9e\xda\xa1\xb5\xb9i\xeb?\xef$%[\xfbvt=;\x985\xc9\xe6\x99z\x89X\xb1$Z\xbb\x0f\x86\x06\x1d\xa9\xceQ\xb8l\x85e\xbel\xd7\xc2\xa6\x18Wqk\xc4\xe4\x10\x05\xb9J\x06{+\x00\xa0\xe9\xbe\xe2\xaf'}}]}) [ 310.099852][T10768] hfs: umask requires a value [ 310.104636][T10768] hfs: unable to parse mount options 23:59:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:41 executing program 5: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 310.250013][T10778] gfs2: Unknown parameter 'fsname' 23:59:41 executing program 4: r0 = socket(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbb) r2 = socket$inet(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)=@assoc_value={r3}, 0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3a}}}}, &(0x7f00000000c0)=0x84) setresuid(0x0, r1, 0x0) socket$caif_stream(0x25, 0x1, 0x0) 23:59:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f00000000c0)={[{@noloccookie='noloccookie'}], [{@fsname={'fsname', 0x3d, '\xa6\xb8v\x0f\x9b\xcbf\x9c\xb5\x9a\x00\xb3U\xed\xd2\x9e\xd0Y\xde\x9aD\x9cs\x1b\xa6p\x1a#\xb3\xc4\x1f\xa4d\xa8O\xc9:D\x04+\x9d\x14\x05x\xf7\xe7c&\x0fM\x82\x1d\xe1\xf8\xfd9)\xf3\xee\x8fMD\xce\x18\x16?\x96\xd4uwE\xcb\xab\x97\xe7\x9e\xda\xa1\xb5\xb9i\xeb?\xef$%[\xfbvt=;\x985\xc9\xe6\x99z\x89X\xb1$Z\xbb\x0f\x86\x06\x1d\xa9\xceQ\xb8l\x85e\xbel\xd7\xc2\xa6\x18Wqk\xc4\xe4\x10\x05\xb9J\x06{+\x00\xa0\xe9\xbe\xe2\xaf'}}]}) [ 310.343942][T10782] hfs: umask requires a value [ 310.353370][T10782] hfs: unable to parse mount options 23:59:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:42 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) [ 310.725020][T10799] gfs2: Unknown parameter 'fsname' [ 310.840989][T10806] hfs: umask requires a value [ 310.895040][T10806] hfs: unable to parse mount options 23:59:42 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:42 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:42 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:42 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000340)={0x0, 0x1, 0x401, {0x1, 0x80}}) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_mreqsrc(r5, 0x0, 0x26, &(0x7f00000000c0)={@remote, @broadcast, @dev}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) setsockopt$TIPC_MCAST_BROADCAST(r4, 0x10f, 0x85) [ 311.353982][T10828] hfs: umask requires a value [ 311.393600][T10828] hfs: unable to parse mount options 23:59:43 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 311.878235][T10840] hfs: umask requires a value 23:59:43 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) [ 311.931355][T10840] hfs: unable to parse mount options 23:59:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:43 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{0x0}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:44 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:44 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000000340)={0x0, 0x1, 0x401, {0x1, 0x80}}) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_mreqsrc(r5, 0x0, 0x26, &(0x7f00000000c0)={@remote, @broadcast, @dev}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) setsockopt$TIPC_MCAST_BROADCAST(r4, 0x10f, 0x85) 23:59:44 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:44 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x140a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmsg$netlink(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000140)={0xd8, 0x38, 0x400, 0x70bd29, 0x25dfdbfb, "", [@generic="02d5af007db6e06bd30e6d1c4fb446dc2beb8d4d7d2b80e7b3a15fdf3dd0be06fc8f434e63dc6ebd94134b619a41980903af3345d461e9ef30d01f730434a7ba1454f4f18f54", @typed={0xe, 0x0, 0x0, 0x0, @str='/dev/full\x00'}, @nested={0x6d, 0x51, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @ipv4=@local}, @generic="49700427536ec15ef7892e245574823acb12e462e1cc865477ae591f88b77ad352a39b0812d0b8316d8ea680892de581c19fdcf1", @typed={0x4, 0x86}, @generic="45a812c72bb4bae729c3161897b4bb65ecd1b16aa00ecb4931f8ae332a6ead8432e6508c874a7b67c7"]}]}, 0xd8}, {&(0x7f00000002c0)={0xa0, 0x28, 0x2, 0x70bd2d, 0x25dfdbfc, "", [@typed={0xf, 0x54, 0x0, 0x0, @str='/dev/hwrng\x00'}, @generic="7a823a0e2ee0c76d33ebb183ae3103d544eb1ae40285ce3092335c570ad4a009fbf6550a1bd200306b744a40829335ed4818986b1e0a2e558517b537c2b543922bdb2223da9bf14b7e6cf1f4c54f178087c69a1a41b99f4ff29be774689a38280597ba5289e0661b5e49478c37e360653ffd68c78cef0286acf3b2085bb9"]}, 0xa0}, {&(0x7f0000000440)={0x1010, 0x10, 0x0, 0x70bd2c, 0x25dfdbfb, "", [@generic="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"]}, 0x1010}, {&(0x7f0000000240)={0x38, 0x2b, 0x100, 0x70bd2d, 0x25dfdbfd, "", [@typed={0x4, 0x1d}, @nested={0x4, 0x6d}, @typed={0x14, 0x51, 0x0, 0x0, @ipv6=@ipv4={[], [], @multicast2}}, @generic="4e3fdbbbcb2f0ad04881a9"]}, 0x38}], 0x4, &(0x7f0000001500)=[@rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x4000) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000380)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x200000201, 0x0, 0x4c8]}) sendmsg$RDMA_NLDEV_CMD_DELLINK(0xffffffffffffffff, 0x0, 0x20004014) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000280)={0xc, 0x8001}) ioctl$KVM_RUN(r0, 0xae80, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:59:44 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x375, 0x0) 23:59:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1524}, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0fa2"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffe36, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x0, 0x301}, 0x14}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, 0x0, 0x200, 0x70bd24, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4802) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4028641b, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x20, &(0x7f000000b000/0x12000)=nil, 0x3}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:59:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:44 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0) 23:59:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) [ 313.402994][T10904] kvm: emulating exchange as write 23:59:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:45 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0) 23:59:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:45 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0) 23:59:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask', 0x3d, 0x100000001}}]}) 23:59:45 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, 0x0, 0x0, 0x0) 23:59:45 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCATTCHAN(r1, 0x40047452, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6d2c00, 0x0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f00000002c0)="f2d3881b16892a187e1414e5dd9a1a9bd04ff1d1d9ba31f2f4668e4aa89cc02bb91b1d0a6d24702b46ed44fc2376998a801537fc62ed25e018012bf107815f289377f928d1b49af99f2260550cb11bf53e72b56bfa2c9b8eda679eb113e2cf5bade258606648de7039892e397ea1a3681176c0fb02a53bb08d6dd9c0007ec47824") 23:59:46 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, 0x0, 0x0, 0x0) 23:59:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:59:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001580), 0x0, 0x0, 0x11}, 0x8000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0xa9adfb74efe4f5fa, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000200)={0x0, "c10eb4832c38cbbd83711901ed3638669ebdfbf2acfd44c0d6e828c153ec5c12", 0x4, 0x1000, 0x7f, 0x9c, 0x1, 0x0, 0xf8e9, 0xfffffc01}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000080)) [ 314.505733][T10970] IPVS: ftp: loaded support on port[0] = 21 [ 314.577358][T10971] sp0: Synchronizing with TNC 23:59:46 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001b00)=[{&(0x7f0000000700)=""/86, 0x56}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') preadv(r0, 0x0, 0x0, 0x0) [ 314.698676][T10999] hfs: can't find a HFS filesystem on dev loop3 [ 314.705001][T10970] IPVS: ftp: loaded support on port[0] = 21 [ 314.749655][T10989] sp0: Synchronizing with TNC 23:59:46 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x4, 0x0, 0x0, 0x2, 0x5}, 0x0) dup(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = gettid() setpriority(0x0, r1, 0x5) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet(0xa, 0x801, 0x84) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000300)=0x7fff) listen(0xffffffffffffffff, 0xfffffffffffffffe) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000001400)="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", 0x600) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000140)='syzkaller\x00', &(0x7f0000000180)='vmnet0procnodev\x00') sendfile(r2, r3, 0x0, 0x10000) 23:59:46 executing program 0: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1d020, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'cp869'}}, {@session={'session', 0x3d, 0x9}}], [{@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role', 0x3d, 'hfs\x00'}}]}) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000080)="45b0dd6beedaf4c2246af3", 0xb) 23:59:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:46 executing program 4: unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCATTCHAN(r1, 0x40047452, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x6d2c00, 0x0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f00000002c0)="f2d3881b16892a187e1414e5dd9a1a9bd04ff1d1d9ba31f2f4668e4aa89cc02bb91b1d0a6d24702b46ed44fc2376998a801537fc62ed25e018012bf107815f289377f928d1b49af99f2260550cb11bf53e72b56bfa2c9b8eda679eb113e2cf5bade258606648de7039892e397ea1a3681176c0fb02a53bb08d6dd9c0007ec47824") 23:59:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 314.997159][T11050] IPVS: ftp: loaded support on port[0] = 21 [ 315.031442][ T149] tipc: TX() has been purged, node left! [ 315.081128][ T27] audit: type=1804 audit(1590191986.675:4): pid=11045 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir858384917/syzkaller.ReteSx/24/file0/file0" dev="loop1" ino=24 res=1 [ 315.092535][T11050] sp0: Synchronizing with TNC [ 315.145610][T11085] hfs: can't find a HFS filesystem on dev loop3 23:59:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:59:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x2d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x0, 0x0) setsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0xfffffffffffffffd, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r5, 0xc46dfc707e1df77d}, 0x14}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f0000000240)={0x88, r5, 0x300, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x42}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5ce6c810}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}]}]}, 0x88}}, 0x48041) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x2c, r6, 0x0, 0x70bd2d, 0x25dfdbff, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_DEBUG={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x48814) write$cgroup_int(r0, &(0x7f0000000200), 0x400086) 23:59:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)=@assoc_value={r1}, 0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={r1, 0x2}, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = syz_open_dev$ndb(&(0x7f0000000440)='/dev/nbd#\x00', 0x0, 0x11300) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x17b) r4 = socket$nl_rdma(0x10, 0x3, 0x14) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r6) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000003180)={&(0x7f0000000000)=ANY=[@ANYBLOB="38000000031401"], 0x1}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r8, 0xc0205648, &(0x7f0000000140)={0x4, 0x9, 0x5, 0xffffffffffffffff, 0x0, &(0x7f0000000100)={0xa30001, 0x7fffffff, [], @p_u16=&(0x7f0000000040)=0xff}}) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x1a0, 0x1403, 0x800, 0x70bd2c, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'macvlan1\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'netpci0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bridge_slave_0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ip6gretap0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'batadv_slave_0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'macvlan0\x00'}}, {{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'ipvlan0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'batadv_slave_1\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bond_slave_0\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_vlan\x00'}}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x10}, 0x80) sendfile(r4, r2, 0x0, 0x80000003) 23:59:47 executing program 1: r0 = socket$inet6(0xa, 0x805, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f00000002c0)="ff02040000eeff0000000000000000000000000000020205", 0x18) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000200)={0x1ff, 0x0, {0x1, 0x3, 0x10000, 0x3, 0x326}, 0x34da}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = getpgrp(0xffffffffffffffff) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r4}) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x1000004}, 0x1c, &(0x7f0000000080)=[{&(0x7f0000000140)="d3ff2838ac3916a4ba3d32895f6ec9416bd36a235b52cf87a711c6b2ff04b527b5e3c7901d2fabb2c9cf8721f2b22f5ee951768b7b9fe2c125595c803e5586a0d75d606b9d90ac656aa5f8334baeb099e0705d3cf633c7cf2e1ad3dbc700134b74eaefe92a3a5fd9053b7c6d673689600f0dea18751cb48cdd229cf9da051cd4d2c7d5a07d7086a742afc33da019d2e78d65701c806cbf8c619156dc13f2b0615d93416df9dd48f6272ffbbd823c6d", 0xaf}], 0x1}}], 0x1, 0x0) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000000)={0x2}, 0x2000, 0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f00000003c0)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffb}) msgctl$MSG_INFO(r5, 0xc, &(0x7f00000000c0)=""/58) [ 315.572401][T11110] hfs: can't find a HFS filesystem on dev loop3 23:59:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) 23:59:47 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x80001d00c0d0) r2 = socket$inet6(0xa, 0x3, 0x1) close(r1) r3 = open(&(0x7f0000000080)='./bus\x00', 0x101002, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d0) 23:59:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='lockproto=lock_nolock,l\bcktabl_=ev/\x00\x00\x00\x00\x00\x00\x00\x00\x00,\x00', @ANYRESOCT=r1, @ANYRES64=r0]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r4 = dup3(r2, r3, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UI_DEV_SETUP(r6, 0x405c5503, &(0x7f0000000180)={{0x2, 0x3ff, 0x0, 0x294}, 'syz0\x00', 0x36}) [ 315.828038][T11128] hfs: can't find a HFS filesystem on dev loop3 23:59:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) [ 316.046578][T11135] gfs2: Unknown parameter 'lcktabl_' 23:59:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 316.153717][T11146] hfs: can't find a HFS filesystem on dev loop3 23:59:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 316.206181][T11155] gfs2: Unknown parameter 'lcktabl_' 23:59:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) [ 316.283965][T11161] QAT: Invalid ioctl 23:59:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:48 executing program 0: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000d80), 0x4) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000002000/0x18000)=nil, 0x0, 0xffffffffffffff14, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SMI(r6, 0xaeb7) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000100)={0x1ff, 0x9, 0x4, 0x200000, 0x5, {r2, r3/1000+10000}, {0x5, 0x2, 0x1, 0xff, 0x8, 0x0, "a87f6acb"}, 0xd5, 0x2, @userptr=0x3, 0xfffffff7, 0x0, r6}) getsockopt$inet6_mreq(r7, 0x29, 0x1b, &(0x7f0000000180)={@ipv4}, &(0x7f00000001c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) [ 316.517787][ T27] audit: type=1800 audit(1590191988.115:5): pid=11137 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=15861 res=0 [ 316.553740][T11174] hfs: can't find a HFS filesystem on dev loop3 23:59:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40040, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x20000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f00000000c0)=0x7, 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 23:59:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask'}}]}) [ 316.857120][T11204] hfs: can't find a HFS filesystem on dev loop3 23:59:48 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r3, 0xc46dfc707e1df77d}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x98, r3, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x28, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x18, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}]}, @TIPC_NLA_NODE={0x44, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffff80a}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x84}, 0x8800) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x8, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000005c0)={0x0, 0x700, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="31000000000000000000090000003c0003000800400000000000140002006c6f000000000000000000000000000014000300ff0300000000000000400300000000010800010001000000ab0700007de5cf5ee9b506c1bb2ce6471d7a25aaf019a18044d306dbc7facad64568c48ad3a2bf742e31120000000000000000000000000000000012da851c9fda9a56d560c451a76caff65ca977444c2947d79e097458a5fb1d3bb693e97f0d12d523742910f536479e006660ad60524eb7580000000000000000"], 0x50}}, 0x0) 23:59:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask'}}]}) 23:59:48 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c913000180f0", 0x21}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xff, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102", 0x1cb}], 0x1}, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r1, 0x13}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x3fa0996ed73daa6f, 0x0) [ 317.113962][T11217] IPVS: ftp: loaded support on port[0] = 21 [ 317.210847][T11221] hfs: can't find a HFS filesystem on dev loop3 23:59:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@umask={'umask'}}]}) 23:59:49 executing program 0: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x8000, 0x0) connect$pppl2tp(r5, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x1, 0x4, 0x0, 0x0, {0xa, 0x4e24, 0xfff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xff}}}, 0x3a) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="380000002400ffffff7f000000003c0005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r5, 0xc01064b5, &(0x7f0000000380)={&(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x4}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x2, {0x0, 0x0, 0x0, r7, {0x10, 0x10}, {}, {0xe, 0xb}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0xc, 0x2, [@TCA_FLOWER_KEY_IPV4_SRC={0x8, 0xa, @multicast1}]}}]}, 0x3c}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec15, 0x0) 23:59:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 317.503680][T11249] hfs: can't find a HFS filesystem on dev loop3 23:59:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x7, &(0x7f0000000080)=0x4) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f0000000300)=0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000002000/0x18000)=nil, 0x0, 0xffffffffffffff14, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r6, 0xae9a) ioctl$KVM_RUN(r6, 0xae80, 0x0) r7 = dup2(r6, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r7, 0x40a85323, &(0x7f00000000c0)={{0x3, 0x20}, 'port0\x00', 0x1, 0x80002, 0x80, 0x1, 0x6, 0x2, 0x9, 0x0, 0x3, 0x9}) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r9, 0x40305652, &(0x7f0000000000)={0x7, 0x1, 0x5, 0x101, 0x1, 0x62d, 0x2}) [ 317.586276][T11256] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 317.697372][T11260] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 23:59:49 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x0, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}}, 0x88) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fff, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x4, 0x1800}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000300)={0x3, 0x1, 0xd, 0x0, 0xe1, &(0x7f00000007c0)}) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f00000001c0)={0x8008, 0xfe6f, 0xff, 0x0, 0xfffffffd, 0x5, 0x2}) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f00000004c0)=""/163) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, @bcast, @rose={'rose', 0x0}, 0x4a0, 'syz0\x00', @default, 0x3f, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getpid() dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000080)={0x3e68, 0x3b92e44e, 0x101}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) 23:59:49 executing program 4: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x14, r3, 0xc46dfc707e1df77d}, 0x14}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x98, r3, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x28, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x18, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}]}, @TIPC_NLA_NODE={0x44, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffff80a}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x84}, 0x8800) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x8, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x4000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f00000005c0)={0x0, 0x700, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="31000000000000000000090000003c0003000800400000000000140002006c6f000000000000000000000000000014000300ff0300000000000000400300000000010800010001000000ab0700007de5cf5ee9b506c1bb2ce6471d7a25aaf019a18044d306dbc7facad64568c48ad3a2bf742e31120000000000000000000000000000000012da851c9fda9a56d560c451a76caff65ca977444c2947d79e097458a5fb1d3bb693e97f0d12d523742910f536479e006660ad60524eb7580000000000000000"], 0x50}}, 0x0) [ 317.932313][ T149] tipc: TX() has been purged, node left! [ 318.011538][ T149] tipc: TX() has been purged, node left! [ 318.017413][T11296] IPVS: ftp: loaded support on port[0] = 21 [ 318.046713][ T149] tipc: TX() has been purged, node left! 23:59:49 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x0, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}}, 0x88) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fff, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x4, 0x1800}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000300)={0x3, 0x1, 0xd, 0x0, 0xe1, &(0x7f00000007c0)}) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f00000001c0)={0x8008, 0xfe6f, 0xff, 0x0, 0xfffffffd, 0x5, 0x2}) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f00000004c0)=""/163) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, @bcast, @rose={'rose', 0x0}, 0x4a0, 'syz0\x00', @default, 0x3f, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getpid() dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000080)={0x3e68, 0x3b92e44e, 0x101}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) 23:59:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:50 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x0, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}}, 0x88) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fff, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x4, 0x1800}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000300)={0x3, 0x1, 0xd, 0x0, 0xe1, &(0x7f00000007c0)}) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f00000001c0)={0x8008, 0xfe6f, 0xff, 0x0, 0xfffffffd, 0x5, 0x2}) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f00000004c0)=""/163) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, @bcast, @rose={'rose', 0x0}, 0x4a0, 'syz0\x00', @default, 0x3f, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getpid() dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000080)={0x3e68, 0x3b92e44e, 0x101}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) 23:59:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:50 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x0, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}}, 0x88) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fff, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x4, 0x1800}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000300)={0x3, 0x1, 0xd, 0x0, 0xe1, &(0x7f00000007c0)}) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f00000001c0)={0x8008, 0xfe6f, 0xff, 0x0, 0xfffffffd, 0x5, 0x2}) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f00000004c0)=""/163) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, @bcast, @rose={'rose', 0x0}, 0x4a0, 'syz0\x00', @default, 0x3f, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getpid() dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000080)={0x3e68, 0x3b92e44e, 0x101}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) 23:59:50 executing program 4: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x0, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}}, 0x88) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fff, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x4, 0x1800}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000300)={0x3, 0x1, 0xd, 0x0, 0xe1, &(0x7f00000007c0)}) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f00000001c0)={0x8008, 0xfe6f, 0xff, 0x0, 0xfffffffd, 0x5, 0x2}) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f00000004c0)=""/163) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, @bcast, @rose={'rose', 0x0}, 0x4a0, 'syz0\x00', @default, 0x3f, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getpid() dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000080)={0x3e68, 0x3b92e44e, 0x101}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) 23:59:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:51 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x0, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}}, 0x88) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fff, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x4, 0x1800}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000300)={0x3, 0x1, 0xd, 0x0, 0xe1, &(0x7f00000007c0)}) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f00000001c0)={0x8008, 0xfe6f, 0xff, 0x0, 0xfffffffd, 0x5, 0x2}) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f00000004c0)=""/163) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, @bcast, @rose={'rose', 0x0}, 0x4a0, 'syz0\x00', @default, 0x3f, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getpid() dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000080)={0x3e68, 0x3b92e44e, 0x101}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) 23:59:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x8ab9, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0xfffc}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) openat$mice(0xffffffffffffff9c, &(0x7f0000000100)='/dev/input/mice\x00', 0x125042) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f00000001c0)={0x5, 0x2, 0x2}) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f0000000140)={0x0, 0x5, 0x0, 0x0, 0x0, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "bc4c74c7"}, 0x0, 0x2, @offset=0x400040, 0x10ff00}) msgget$private(0x0, 0x200) 23:59:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:51 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000580)={0x0, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}}, 0x88) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7fff, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = semget$private(0x0, 0x6, 0x0) semop(0x0, &(0x7f00000000c0)=[{0x0, 0x4, 0x1800}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000300)={0x3, 0x1, 0xd, 0x0, 0xe1, &(0x7f00000007c0)}) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f00000001c0)={0x8008, 0xfe6f, 0xff, 0x0, 0xfffffffd, 0x5, 0x2}) semctl$IPC_INFO(r1, 0x3, 0x3, &(0x7f00000004c0)=""/163) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000280)={0x0, @bcast, @rose={'rose', 0x0}, 0x4a0, 'syz0\x00', @default, 0x3f, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) getpid() dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, &(0x7f0000000080)={0x3e68, 0x3b92e44e, 0x101}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) 23:59:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f00000002c0)="ba4300ecf32ef0f750b50f012a163066b969025eea0f3266b99f0000400f3266654757b8ec111000b1b101c10f23c80f21f866350800a0000f23f8b82b000f20d86635080000000f22d80f01bd0050", 0x4c}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000040)={{0x0, 0x0, @identifier="d0d45d252989150600b07b1b12e38a85"}}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bind$l2tp(r4, &(0x7f0000000140)={0x2, 0x0, @broadcast, 0x1}, 0x10) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:59:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 321.551354][ T149] tipc: TX() has been purged, node left! 23:59:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:59:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:01 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:02 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:02 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = dup2(r3, r0) setsockopt$TIPC_GROUP_LEAVE(r4, 0x10f, 0x88) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2300000025000511d25a80648c63940d0424fc60040018000a001100022f000037153e", 0x23}], 0x1}, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x9, 0x7f, 0x4, 0x6, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r4, 0xc01064b3, &(0x7f0000000140)={r5}) 00:00:03 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:04 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 332.417258][T11825] sysfs: cannot create duplicate filename '/class/ieee80211/!' [ 332.450978][T11825] CPU: 0 PID: 11825 Comm: syz-executor.1 Not tainted 5.7.0-rc1-syzkaller #0 [ 332.459708][T11825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.469764][T11825] Call Trace: [ 332.473072][T11825] dump_stack+0x11d/0x187 [ 332.477419][T11825] sysfs_warn_dup.cold+0x1c/0x3d [ 332.482417][T11825] sysfs_do_create_link_sd.isra.0+0x115/0x120 [ 332.488505][T11825] sysfs_create_link+0x56/0x90 [ 332.493285][T11825] device_add+0x4f1/0x10b0 [ 332.497811][T11825] ? ieee80211_set_bitrate_flags+0xde/0x420 [ 332.503713][T11825] wiphy_register+0x1317/0x1820 [ 332.508570][T11825] ? ieee80211_register_hw+0x76d/0x1d70 [ 332.514128][T11825] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 332.520124][T11825] ieee80211_register_hw+0xc82/0x1d70 [ 332.525570][T11825] ? hrtimer_init+0x56/0x150 [ 332.530223][T11825] mac80211_hwsim_new_radio+0x12ff/0x1ad0 [ 332.535958][T11825] ? kasprintf+0x74/0xa0 [ 332.540239][T11825] hwsim_new_radio_nl+0x61f/0x860 [ 332.545280][T11825] genl_rcv_msg+0x409/0x8c0 [ 332.549810][T11825] netlink_rcv_skb+0xaf/0x260 [ 332.554494][T11825] ? genl_family_rcv_msg_attrs_parse+0x200/0x200 [ 332.560829][T11825] genl_rcv+0x2e/0x40 [ 332.564824][T11825] netlink_unicast+0x390/0x4c0 [ 332.569596][T11825] netlink_sendmsg+0x4cf/0x8a0 [ 332.574383][T11825] ? netlink_unicast+0x4c0/0x4c0 [ 332.579322][T11825] sock_sendmsg+0x98/0xc0 [ 332.583773][T11825] ____sys_sendmsg+0x493/0x4c0 [ 332.588590][T11825] ? debug_smp_processor_id+0x3f/0x129 [ 332.594575][T11825] ___sys_sendmsg+0xb5/0x100 [ 332.599191][T11825] ? __fget_files+0xa2/0x1c0 [ 332.604105][T11825] ? __fget_light+0xc0/0x1a0 [ 332.608849][T11825] ? __fdget+0x29/0x30 [ 332.612933][T11825] ? sockfd_lookup_light+0xa5/0x100 [ 332.618248][T11825] __sys_sendmsg+0x9b/0x150 [ 332.622793][T11825] __x64_sys_sendmsg+0x4c/0x60 [ 332.627567][T11825] do_syscall_64+0xc7/0x3b0 [ 332.632136][T11825] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 332.638038][T11825] RIP: 0033:0x45ca29 [ 332.641945][T11825] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:00:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 332.661685][T11825] RSP: 002b:00007fa805f5bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 332.670141][T11825] RAX: ffffffffffffffda RBX: 0000000000500d80 RCX: 000000000045ca29 [ 332.678154][T11825] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 332.686128][T11825] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 332.694134][T11825] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 332.702101][T11825] R13: 00000000000009fd R14: 00000000004ccd59 R15: 00007fa805f5c6d4 00:00:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:04 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:05 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:06 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:07 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:07 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:07 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:07 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:08 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:09 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 0: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:10 executing program 1: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 0: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 0: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:11 executing program 1: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:13 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, 0x0, &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:15 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ec", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:15 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:15 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:15 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:16 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc011", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:17 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc011", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:17 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:17 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc011", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:17 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:17 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:17 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:18 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:18 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:18 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:18 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:18 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:19 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", 0x0) syz_mount_image$xfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:19 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", 0x0) syz_mount_image$xfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:19 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", 0x0) syz_mount_image$xfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:20 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:20 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:20 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000000)={0x4}) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x2, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={0x0, 0xde, 0x90}, &(0x7f0000000380)=ANY=[@ANYBLOB="656e633d706b63733120686173683d6173682d636500000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000c791cf3c22b52a11e12b72aa55880bce842b2beccebd9bc7e81d9cfc8db32df5235e9485584d9d04eda1441e3dfeccc70cc4af62eccca667333241"], &(0x7f00000001c0)="9b400ccbdd50784f89c3a6250991a6d1b0904a342b9ae5fc038756d90a81723a38e8f1d86a7a0627c3b742d18813fe05188bfc9ac0acc0116e56dbe5ffd33a09decf852c42c5ab34a80fe2d175cff4538be0486db3a9c68e7a4fa9285ee9175b0c816fa0bc8fa57b99260a643e76ecbc14f12f7160ce3616f93fac4ad71b2563397e3859c8ac3fcd5e35a49ce199e105ce7dd3b4fb59fcff7d1f3f4db65a75452b47cadc44aec7f33447c264b007731ae38d7eca7e42c3f39c21603cbd86d18376fdf28371ffb764fab2a5e0795e99d3030cd9c373b46abea87a7d983001", &(0x7f00000002c0)=""/144) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 00:00:20 executing program 2: clone(0x30020100, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, 0x0, 0x0, &(0x7f00000001c0)="9b", 0x0) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 348.882210][ T1925] ================================================================== [ 348.890355][ T1925] BUG: KCSAN: data-race in watchdog / worker_thread [ 348.896931][ T1925] [ 348.899260][ T1925] write to 0xffff8880b08ad010 of 8 bytes by task 10179 on cpu 0: [ 348.906977][ T1925] worker_thread+0x1c9/0x7e0 [ 348.911580][ T1925] kthread+0x203/0x230 [ 348.915644][ T1925] ret_from_fork+0x1f/0x30 [ 348.920040][ T1925] [ 348.922363][ T1925] read to 0xffff8880b08ad010 of 8 bytes by task 1925 on cpu 1: [ 348.929906][ T1925] watchdog+0x2b8/0x960 [ 348.934084][ T1925] kthread+0x203/0x230 [ 348.938142][ T1925] ret_from_fork+0x1f/0x30 [ 348.942548][ T1925] [ 348.944877][ T1925] Reported by Kernel Concurrency Sanitizer on: [ 348.951038][ T1925] CPU: 1 PID: 1925 Comm: khungtaskd Not tainted 5.7.0-rc1-syzkaller #0 [ 348.959357][ T1925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.969429][ T1925] ================================================================== [ 348.977487][ T1925] Kernel panic - not syncing: panic_on_warn set ... [ 348.984078][ T1925] CPU: 1 PID: 1925 Comm: khungtaskd Not tainted 5.7.0-rc1-syzkaller #0 [ 348.992308][ T1925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.002724][ T1925] Call Trace: [ 349.006105][ T1925] dump_stack+0x11d/0x187 [ 349.010446][ T1925] panic+0x210/0x640 [ 349.014351][ T1925] ? vprintk_func+0x89/0x13a [ 349.018942][ T1925] kcsan_report.cold+0xc/0x1a [ 349.023621][ T1925] kcsan_setup_watchpoint+0x3fb/0x440 [ 349.028999][ T1925] watchdog+0x2b8/0x960 [ 349.033178][ T1925] ? __read_once_size.constprop.0+0x20/0x20 [ 349.039068][ T1925] kthread+0x203/0x230 [ 349.043135][ T1925] ? kthread_unpark+0xd0/0xd0 [ 349.047821][ T1925] ret_from_fork+0x1f/0x30 [ 349.053764][ T1925] Kernel Offset: disabled [ 349.058079][ T1925] Rebooting in 86400 seconds..