ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f00000001c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 687.581266][T31332] XFS (loop3): log mount failed [ 687.627281][T31353] Unknown options in mask d87b [ 687.706195][T31361] FAULT_INJECTION: forcing a failure. [ 687.706195][T31361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 687.719462][T31361] CPU: 1 PID: 31361 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190627 #24 [ 687.728591][T31361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.738658][T31361] Call Trace: [ 687.741984][T31361] dump_stack+0x172/0x1f0 [ 687.746349][T31361] should_fail.cold+0xa/0x15 [ 687.750984][T31361] ? fault_create_debugfs_attr+0x180/0x180 [ 687.756835][T31361] ? is_bpf_text_address+0xac/0x170 [ 687.762065][T31361] should_fail_alloc_page+0x50/0x60 [ 687.767285][T31361] __alloc_pages_nodemask+0x1a1/0x8f0 [ 687.772779][T31361] ? __alloc_pages_slowpath+0x2520/0x2520 [ 687.778610][T31361] ? kasan_check_read+0x11/0x20 [ 687.783567][T31361] ? fault_create_debugfs_attr+0x180/0x180 [ 687.789405][T31361] cache_grow_begin+0x90/0xd20 [ 687.794206][T31361] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 687.799943][T31361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.806220][T31361] __kmalloc+0x6af/0x770 [ 687.810484][T31361] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 687.816410][T31361] tomoyo_realpath_from_path+0xcd/0x7a0 [ 687.821975][T31361] ? tomoyo_path_perm+0x1cb/0x430 [ 687.827038][T31361] tomoyo_path_perm+0x230/0x430 [ 687.827054][T31361] ? tomoyo_path_perm+0x1cb/0x430 [ 687.827075][T31361] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 687.827110][T31361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.840983][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 687.843080][T31361] tomoyo_path_truncate+0x1d/0x30 [ 687.843099][T31361] security_path_truncate+0xf2/0x150 [ 687.843123][T31361] do_sys_ftruncate+0x3d9/0x550 [ 687.843146][T31361] __x64_sys_ftruncate+0x59/0x80 [ 687.849611][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 687.855280][T31361] do_syscall_64+0xfd/0x6a0 [ 687.855304][T31361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.855316][T31361] RIP: 0033:0x4594e7 [ 687.855333][T31361] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.855350][T31361] RSP: 002b:00007ffbf03d9a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 687.870581][T31361] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004594e7 [ 687.870592][T31361] RDX: 0000000020000128 RSI: 0000000008100000 RDI: 0000000000000004 [ 687.870602][T31361] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 687.870612][T31361] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 10:06:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 687.870621][T31361] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 10:06:27 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r4, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r4, &(0x7f00000001c0), 0x1000) [ 688.145950][T31371] FAULT_INJECTION: forcing a failure. [ 688.145950][T31371] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 688.173909][T31368] Unknown options in mask d87b [ 688.207715][T31371] CPU: 1 PID: 31371 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190627 #24 [ 688.216874][T31371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.226945][T31371] Call Trace: [ 688.230265][T31371] dump_stack+0x172/0x1f0 [ 688.234706][T31371] should_fail.cold+0xa/0x15 [ 688.239311][T31371] ? fault_create_debugfs_attr+0x180/0x180 [ 688.245132][T31371] ? ___might_sleep+0x163/0x280 [ 688.250011][T31371] should_fail_alloc_page+0x50/0x60 [ 688.255220][T31371] __alloc_pages_nodemask+0x1a1/0x8f0 [ 688.260617][T31371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.266877][T31371] ? debug_smp_processor_id+0x3c/0x214 [ 688.272350][T31371] ? __alloc_pages_slowpath+0x2520/0x2520 [ 688.272399][T31371] ? kasan_check_read+0x11/0x20 [ 688.272422][T31371] ? __lockdep_free_key_range+0x120/0x120 [ 688.272438][T31371] ? kasan_check_read+0x11/0x20 [ 688.272457][T31371] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 688.272482][T31371] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 688.306286][T31371] alloc_pages_vma+0xdd/0x560 [ 688.310990][T31371] shmem_alloc_page+0xc0/0x180 [ 688.315771][T31371] ? shmem_swapin+0x1a0/0x1a0 [ 688.320464][T31371] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.326725][T31371] ? xas_start+0x166/0x560 [ 688.331175][T31371] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 688.336998][T31371] ? __vm_enough_memory+0x17e/0x3a0 [ 688.342231][T31371] shmem_alloc_and_acct_page+0x165/0x990 [ 688.347881][T31371] shmem_getpage_gfp+0x598/0x2680 [ 688.352926][T31371] ? current_time+0x6b/0x140 [ 688.357540][T31371] ? mark_lock+0xc0/0x11e0 [ 688.362172][T31371] ? shmem_unuse_inode+0x1010/0x1010 [ 688.367470][T31371] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 688.373289][T31371] ? current_time+0x6b/0x140 [ 688.377893][T31371] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 688.383720][T31371] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.389979][T31371] ? iov_iter_fault_in_readable+0x22c/0x450 [ 688.395905][T31371] shmem_write_begin+0x105/0x1e0 [ 688.401046][T31371] generic_perform_write+0x23b/0x530 [ 688.406379][T31371] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 688.414470][T31371] ? current_time+0x140/0x140 [ 688.419244][T31371] ? kasan_check_write+0x14/0x20 [ 688.424203][T31371] ? down_write+0xdf/0x150 [ 688.428737][T31371] __generic_file_write_iter+0x25e/0x630 [ 688.434393][T31371] ? kasan_check_read+0x11/0x20 [ 688.439261][T31371] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 688.445004][T31371] generic_file_write_iter+0x356/0x620 [ 688.455306][T31371] ? kasan_check_read+0x11/0x20 [ 688.461320][T31371] ? __generic_file_write_iter+0x630/0x630 [ 688.467166][T31371] ? kasan_check_read+0x11/0x20 [ 688.472051][T31371] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.478314][T31371] ? iov_iter_init+0xee/0x210 [ 688.483018][T31371] new_sync_write+0x4d3/0x770 [ 688.487729][T31371] ? new_sync_read+0x800/0x800 [ 688.492606][T31371] ? mark_held_locks+0xf0/0xf0 [ 688.497421][T31371] __vfs_write+0xe1/0x110 [ 688.501808][T31371] vfs_write+0x268/0x5d0 [ 688.506076][T31371] ksys_pwrite64+0x183/0x1c0 [ 688.510695][T31371] ? __ia32_sys_pread64+0xf0/0xf0 [ 688.515745][T31371] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.521224][T31371] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 688.526705][T31371] ? do_syscall_64+0x26/0x6a0 [ 688.531418][T31371] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.537587][T31371] ? do_syscall_64+0x26/0x6a0 [ 688.542293][T31371] __x64_sys_pwrite64+0x97/0xf0 [ 688.547165][T31371] do_syscall_64+0xfd/0x6a0 [ 688.551693][T31371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.557772][T31371] RIP: 0033:0x413467 [ 688.561681][T31371] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 688.581304][T31371] RSP: 002b:00007ffbf03d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 688.590350][T31371] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000413467 [ 688.598380][T31371] RDX: 000000000000007d RSI: 0000000020000040 RDI: 0000000000000004 10:06:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x101ff, 0x1, 0x1000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) r4 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f00000001c0)={0x5, 0x3, 'client0\x00', 0x0, "9546368cee7afcc4", "28f8b5f38405bc3a337e581b1425f5a303eb50345b60bd5b484963712995f515", 0x3, 0x2}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:06:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 10:06:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 688.606480][T31371] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 688.614473][T31371] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 688.622589][T31371] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 10:06:28 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 688.745086][T31379] Unknown options in mask d87b 10:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000011007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) [ 688.893377][T31386] XFS (loop4): Invalid superblock magic number [ 688.965169][T31399] FAULT_INJECTION: forcing a failure. [ 688.965169][T31399] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 689.001139][T31399] CPU: 1 PID: 31399 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190627 #24 [ 689.010334][T31399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.020510][T31399] Call Trace: [ 689.023831][T31399] dump_stack+0x172/0x1f0 [ 689.028180][T31399] should_fail.cold+0xa/0x15 [ 689.032789][T31399] ? fault_create_debugfs_attr+0x180/0x180 [ 689.038628][T31399] ? ___might_sleep+0x163/0x280 [ 689.043501][T31399] should_fail_alloc_page+0x50/0x60 [ 689.048705][T31399] __alloc_pages_nodemask+0x1a1/0x8f0 [ 689.054102][T31399] ? mark_held_locks+0xa4/0xf0 [ 689.058880][T31399] ? _raw_spin_unlock_irq+0x28/0x90 [ 689.064094][T31399] ? __alloc_pages_slowpath+0x2520/0x2520 [ 689.069823][T31399] ? kasan_check_read+0x11/0x20 [ 689.074682][T31399] ? mark_lock+0xc0/0x11e0 [ 689.079106][T31399] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 689.085350][T31399] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 689.091608][T31399] alloc_pages_vma+0xdd/0x560 [ 689.096300][T31399] shmem_alloc_page+0xc0/0x180 [ 689.101072][T31399] ? shmem_swapin+0x1a0/0x1a0 [ 689.105752][T31399] ? trace_hardirqs_on_caller+0x6a/0x240 [ 689.111418][T31399] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 689.117153][T31399] ? __vm_enough_memory+0x17e/0x3a0 [ 689.122378][T31399] shmem_alloc_and_acct_page+0x165/0x990 [ 689.128028][T31399] shmem_getpage_gfp+0x598/0x2680 [ 689.133059][T31399] ? current_time+0x6b/0x140 [ 689.137662][T31399] ? mark_lock+0xc0/0x11e0 [ 689.142106][T31399] ? shmem_unuse_inode+0x1010/0x1010 [ 689.147594][T31399] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 689.153512][T31399] ? current_time+0x6b/0x140 [ 689.158199][T31399] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 689.164204][T31399] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 689.170455][T31399] ? iov_iter_fault_in_readable+0x22c/0x450 [ 689.176379][T31399] shmem_write_begin+0x105/0x1e0 [ 689.181337][T31399] generic_perform_write+0x23b/0x530 [ 689.186650][T31399] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 689.194845][T31399] ? current_time+0x140/0x140 [ 689.199556][T31399] ? kasan_check_write+0x14/0x20 [ 689.204500][T31399] ? down_write+0xdf/0x150 [ 689.208933][T31399] __generic_file_write_iter+0x25e/0x630 [ 689.214656][T31399] ? kasan_check_read+0x11/0x20 [ 689.219512][T31399] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 689.225419][T31399] generic_file_write_iter+0x356/0x620 [ 689.230881][T31399] ? kasan_check_read+0x11/0x20 [ 689.235744][T31399] ? __generic_file_write_iter+0x630/0x630 [ 689.241554][T31399] ? kasan_check_read+0x11/0x20 [ 689.246407][T31399] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 689.252649][T31399] ? iov_iter_init+0xee/0x210 [ 689.257329][T31399] new_sync_write+0x4d3/0x770 [ 689.262019][T31399] ? new_sync_read+0x800/0x800 [ 689.266785][T31399] ? mark_held_locks+0xf0/0xf0 [ 689.271582][T31399] __vfs_write+0xe1/0x110 [ 689.275939][T31399] vfs_write+0x268/0x5d0 [ 689.280193][T31399] ksys_pwrite64+0x183/0x1c0 [ 689.284788][T31399] ? __ia32_sys_pread64+0xf0/0xf0 [ 689.289812][T31399] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 689.295274][T31399] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 689.300743][T31399] ? do_syscall_64+0x26/0x6a0 [ 689.305433][T31399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.311508][T31399] ? do_syscall_64+0x26/0x6a0 [ 689.316193][T31399] __x64_sys_pwrite64+0x97/0xf0 [ 689.321055][T31399] do_syscall_64+0xfd/0x6a0 [ 689.325584][T31399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.331494][T31399] RIP: 0033:0x413467 [ 689.335392][T31399] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 689.355007][T31399] RSP: 002b:00007ffbf03d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 689.363429][T31399] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000413467 [ 689.371404][T31399] RDX: 000000000000007d RSI: 0000000020000040 RDI: 0000000000000004 [ 689.379390][T31399] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 689.387372][T31399] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 689.395372][T31399] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 10:06:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) read$FUSE(r4, &(0x7f00000001c0), 0x1000) 10:06:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='\\fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 689.466795][T31403] Unknown options in mask d87b 10:06:28 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000088007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:06:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) [ 689.769798][T31422] FAULT_INJECTION: forcing a failure. [ 689.769798][T31422] name failslab, interval 1, probability 0, space 0, times 0 [ 689.827385][T31417] Unknown options in mask d87b [ 689.857786][T31422] CPU: 1 PID: 31422 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190627 #24 [ 689.867044][T31422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.877209][T31422] Call Trace: [ 689.880524][T31422] dump_stack+0x172/0x1f0 [ 689.884877][T31422] should_fail.cold+0xa/0x15 [ 689.889488][T31422] ? fault_create_debugfs_attr+0x180/0x180 [ 689.895317][T31422] ? ___might_sleep+0x163/0x280 [ 689.900197][T31422] __should_failslab+0x121/0x190 [ 689.905506][T31422] should_failslab+0x9/0x14 [ 689.910026][T31422] kmem_cache_alloc+0x2aa/0x710 [ 689.914896][T31422] ? stack_trace_save+0xac/0xe0 [ 689.920237][T31422] ? stack_trace_consume_entry+0x190/0x190 [ 689.926068][T31422] __alloc_file+0x27/0x300 [ 689.930516][T31422] alloc_empty_file+0x72/0x170 [ 689.936128][T31422] path_openat+0xef/0x4630 [ 689.940598][T31422] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 689.946430][T31422] ? kasan_slab_alloc+0xf/0x20 [ 689.951216][T31422] ? kmem_cache_alloc+0x121/0x710 [ 689.956256][T31422] ? getname_flags+0xd6/0x5b0 [ 689.960948][T31422] ? getname+0x1a/0x20 [ 689.965058][T31422] ? do_sys_open+0x2c9/0x5d0 [ 689.969668][T31422] ? __x64_sys_open+0x7e/0xc0 [ 689.974374][T31422] ? kasan_check_read+0x11/0x20 [ 689.979507][T31422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.985766][T31422] ? debug_smp_processor_id+0x3c/0x214 [ 689.991427][T31422] ? perf_trace_lock+0xeb/0x4c0 [ 689.996302][T31422] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 690.001696][T31422] ? __lockdep_free_key_range+0x120/0x120 [ 690.007441][T31422] ? __alloc_fd+0x487/0x620 [ 690.011994][T31422] do_filp_open+0x1a1/0x280 [ 690.016532][T31422] ? may_open_dev+0x100/0x100 [ 690.021233][T31422] ? lock_downgrade+0x920/0x920 [ 690.026106][T31422] ? rwlock_bug.part.0+0x90/0x90 [ 690.031067][T31422] ? kasan_check_read+0x11/0x20 [ 690.035927][T31422] ? do_raw_spin_unlock+0x57/0x270 [ 690.041056][T31422] ? _raw_spin_unlock+0x2d/0x50 [ 690.045925][T31422] ? __alloc_fd+0x487/0x620 [ 690.050475][T31422] do_sys_open+0x3fe/0x5d0 [ 690.054917][T31422] ? filp_open+0x80/0x80 [ 690.059179][T31422] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 690.064655][T31422] ? do_syscall_64+0x26/0x6a0 [ 690.069353][T31422] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.075444][T31422] ? do_syscall_64+0x26/0x6a0 [ 690.080142][T31422] __x64_sys_open+0x7e/0xc0 [ 690.084673][T31422] do_syscall_64+0xfd/0x6a0 [ 690.089199][T31422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.095103][T31422] RIP: 0033:0x413401 [ 690.099017][T31422] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 690.118659][T31422] RSP: 002b:00007ffbf03d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 690.127098][T31422] RAX: ffffffffffffffda RBX: 0000000020000128 RCX: 0000000000413401 [ 690.135090][T31422] RDX: 00007ffbf03d9b0a RSI: 0000000000000002 RDI: 00007ffbf03d9b00 [ 690.143083][T31422] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 690.151070][T31422] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 10:06:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 690.159052][T31422] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 690.292454][T31431] Unknown options in mask d87b 10:06:29 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 690.313313][T31427] XFS (loop4): Invalid superblock magic number 10:06:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 690.471475][T31446] FAULT_INJECTION: forcing a failure. [ 690.471475][T31446] name failslab, interval 1, probability 0, space 0, times 0 10:06:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) read$FUSE(r4, &(0x7f00000001c0), 0x1000) [ 690.553600][T31446] CPU: 1 PID: 31446 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190627 #24 [ 690.562778][T31446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.572874][T31446] Call Trace: [ 690.576384][T31446] dump_stack+0x172/0x1f0 [ 690.580751][T31446] should_fail.cold+0xa/0x15 [ 690.585383][T31446] ? fault_create_debugfs_attr+0x180/0x180 [ 690.593060][T31446] ? ___might_sleep+0x163/0x280 [ 690.596896][T31448] Unknown options in mask d87b [ 690.597943][T31446] __should_failslab+0x121/0x190 [ 690.597966][T31446] should_failslab+0x9/0x14 [ 690.597981][T31446] kmem_cache_alloc+0x2aa/0x710 [ 690.598016][T31446] getname_flags+0xd6/0x5b0 [ 690.621607][T31446] getname+0x1a/0x20 [ 690.625710][T31446] do_sys_open+0x2c9/0x5d0 [ 690.630284][T31446] ? filp_open+0x80/0x80 [ 690.634740][T31446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 690.640228][T31446] ? do_syscall_64+0x26/0x6a0 [ 690.644937][T31446] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.651080][T31446] ? do_syscall_64+0x26/0x6a0 [ 690.655800][T31446] __x64_sys_open+0x7e/0xc0 [ 690.660328][T31446] do_syscall_64+0xfd/0x6a0 [ 690.664942][T31446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.670862][T31446] RIP: 0033:0x413401 [ 690.674834][T31446] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 690.694639][T31446] RSP: 002b:00007ffbf03d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 10:06:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000117465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) [ 690.703103][T31446] RAX: ffffffffffffffda RBX: 0000000020000128 RCX: 0000000000413401 [ 690.711132][T31446] RDX: 00007ffbf03d9b0a RSI: 0000000000000002 RDI: 00007ffbf03d9b00 [ 690.719159][T31446] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 690.727173][T31446] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 690.735193][T31446] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 10:06:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0, &(0x7f0000000100), 0x0, 0x0) 10:06:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) get_mempolicy(&(0x7f0000000000), &(0x7f0000000100), 0x5e0b, &(0x7f0000022000/0x3000)=nil, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 690.875118][T31459] Unknown options in mask d87b 10:06:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:30 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 691.164340][T31476] FAULT_INJECTION: forcing a failure. [ 691.164340][T31476] name failslab, interval 1, probability 0, space 0, times 0 [ 691.224763][T31476] CPU: 0 PID: 31476 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190627 #24 [ 691.233977][T31476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.244247][T31476] Call Trace: [ 691.247569][T31476] dump_stack+0x172/0x1f0 [ 691.251937][T31476] should_fail.cold+0xa/0x15 [ 691.256551][T31476] ? fault_create_debugfs_attr+0x180/0x180 [ 691.262564][T31476] ? ___might_sleep+0x163/0x280 [ 691.267533][T31476] __should_failslab+0x121/0x190 [ 691.272499][T31476] should_failslab+0x9/0x14 [ 691.277027][T31476] kmem_cache_alloc+0x2aa/0x710 [ 691.281911][T31476] ? stack_trace_save+0xac/0xe0 [ 691.286788][T31476] ? stack_trace_consume_entry+0x190/0x190 [ 691.292620][T31476] __alloc_file+0x27/0x300 [ 691.297063][T31476] alloc_empty_file+0x72/0x170 [ 691.301853][T31476] path_openat+0xef/0x4630 [ 691.306296][T31476] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 691.312149][T31476] ? kasan_slab_alloc+0xf/0x20 [ 691.316926][T31476] ? kmem_cache_alloc+0x121/0x710 [ 691.321968][T31476] ? getname_flags+0xd6/0x5b0 [ 691.326668][T31476] ? getname+0x1a/0x20 [ 691.330759][T31476] ? do_sys_open+0x2c9/0x5d0 [ 691.335367][T31476] ? __x64_sys_open+0x7e/0xc0 [ 691.340065][T31476] ? kasan_check_read+0x11/0x20 [ 691.344951][T31476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.351308][T31476] ? debug_smp_processor_id+0x3c/0x214 [ 691.356800][T31476] ? perf_trace_lock+0xeb/0x4c0 [ 691.361672][T31476] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 691.367074][T31476] ? __lockdep_free_key_range+0x120/0x120 [ 691.372830][T31476] ? __alloc_fd+0x487/0x620 [ 691.377373][T31476] do_filp_open+0x1a1/0x280 [ 691.381910][T31476] ? may_open_dev+0x100/0x100 [ 691.386646][T31476] ? lock_downgrade+0x920/0x920 [ 691.391519][T31476] ? rwlock_bug.part.0+0x90/0x90 [ 691.396567][T31476] ? kasan_check_read+0x11/0x20 [ 691.401439][T31476] ? do_raw_spin_unlock+0x57/0x270 [ 691.406663][T31476] ? _raw_spin_unlock+0x2d/0x50 [ 691.411547][T31476] ? __alloc_fd+0x487/0x620 [ 691.416084][T31476] do_sys_open+0x3fe/0x5d0 [ 691.420521][T31476] ? filp_open+0x80/0x80 [ 691.424784][T31476] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 691.430258][T31476] ? do_syscall_64+0x26/0x6a0 [ 691.434955][T31476] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.441040][T31476] ? do_syscall_64+0x26/0x6a0 [ 691.445749][T31476] __x64_sys_open+0x7e/0xc0 [ 691.450284][T31476] do_syscall_64+0xfd/0x6a0 [ 691.454822][T31476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.460737][T31476] RIP: 0033:0x413401 [ 691.464662][T31476] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 691.487823][T31476] RSP: 002b:00007ffbf03d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 691.496298][T31476] RAX: ffffffffffffffda RBX: 0000000020000128 RCX: 0000000000413401 [ 691.504293][T31476] RDX: 00007ffbf03d9b0a RSI: 0000000000000002 RDI: 00007ffbf03d9b00 [ 691.512296][T31476] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 10:06:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 691.520283][T31476] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 691.528396][T31476] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 10:06:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:30 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 691.600959][ C0] net_ratelimit: 18 callbacks suppressed [ 691.600969][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 691.612666][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 691.620896][T31475] XFS (loop4): Invalid superblock magic number 10:06:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) read$FUSE(r4, &(0x7f00000001c0), 0x1000) 10:06:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x10001, 0x0, 0x0, 0x2000, &(0x7f0000015000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 691.880713][T31500] connlabel_mt_check: 2 callbacks suppressed [ 691.880723][T31500] Unknown options in mask d87b [ 691.911419][T31505] FAULT_INJECTION: forcing a failure. [ 691.911419][T31505] name failslab, interval 1, probability 0, space 0, times 0 [ 691.971888][T31505] CPU: 0 PID: 31505 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190627 #24 [ 691.981056][T31505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.991162][T31505] Call Trace: [ 691.994481][T31505] dump_stack+0x172/0x1f0 [ 691.999147][T31505] should_fail.cold+0xa/0x15 [ 692.003774][T31505] ? fault_create_debugfs_attr+0x180/0x180 [ 692.009612][T31505] ? ___might_sleep+0x163/0x280 [ 692.014497][T31505] __should_failslab+0x121/0x190 [ 692.019467][T31505] should_failslab+0x9/0x14 [ 692.024024][T31505] kmem_cache_alloc+0x2aa/0x710 [ 692.028906][T31505] ? stack_trace_save+0xac/0xe0 [ 692.033782][T31505] ? stack_trace_consume_entry+0x190/0x190 [ 692.039625][T31505] __alloc_file+0x27/0x300 [ 692.044066][T31505] alloc_empty_file+0x72/0x170 [ 692.048872][T31505] path_openat+0xef/0x4630 [ 692.053308][T31505] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 692.059130][T31505] ? kasan_slab_alloc+0xf/0x20 [ 692.063909][T31505] ? kmem_cache_alloc+0x121/0x710 [ 692.068959][T31505] ? getname_flags+0xd6/0x5b0 [ 692.073659][T31505] ? getname+0x1a/0x20 [ 692.077745][T31505] ? do_sys_open+0x2c9/0x5d0 [ 692.082350][T31505] ? __x64_sys_open+0x7e/0xc0 [ 692.087044][T31505] ? kasan_check_read+0x11/0x20 [ 692.091937][T31505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.098197][T31505] ? debug_smp_processor_id+0x3c/0x214 [ 692.103677][T31505] ? perf_trace_lock+0xeb/0x4c0 [ 692.108548][T31505] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 692.113945][T31505] ? __lockdep_free_key_range+0x120/0x120 [ 692.119697][T31505] ? __alloc_fd+0x487/0x620 [ 692.124311][T31505] do_filp_open+0x1a1/0x280 [ 692.128843][T31505] ? may_open_dev+0x100/0x100 [ 692.133554][T31505] ? lock_downgrade+0x920/0x920 [ 692.138422][T31505] ? rwlock_bug.part.0+0x90/0x90 [ 692.143391][T31505] ? kasan_check_read+0x11/0x20 [ 692.148265][T31505] ? do_raw_spin_unlock+0x57/0x270 [ 692.153404][T31505] ? _raw_spin_unlock+0x2d/0x50 [ 692.158274][T31505] ? __alloc_fd+0x487/0x620 [ 692.162914][T31505] do_sys_open+0x3fe/0x5d0 [ 692.167365][T31505] ? filp_open+0x80/0x80 [ 692.171626][T31505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 692.177105][T31505] ? do_syscall_64+0x26/0x6a0 [ 692.181798][T31505] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.187888][T31505] ? do_syscall_64+0x26/0x6a0 [ 692.192593][T31505] __x64_sys_open+0x7e/0xc0 [ 692.197119][T31505] do_syscall_64+0xfd/0x6a0 [ 692.201650][T31505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.207571][T31505] RIP: 0033:0x413401 [ 692.211486][T31505] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 692.231112][T31505] RSP: 002b:00007ffbf03d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 692.239542][T31505] RAX: ffffffffffffffda RBX: 0000000020000128 RCX: 0000000000413401 [ 692.247524][T31505] RDX: 00007ffbf03d9b0a RSI: 0000000000000002 RDI: 00007ffbf03d9b00 [ 692.255510][T31505] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 692.263493][T31505] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 10:06:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 692.271482][T31505] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 692.279875][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 692.285736][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 692.291642][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 692.297430][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 10:06:31 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 692.480871][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 692.486712][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 692.573481][T31514] Unknown options in mask d87b 10:06:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d308800000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='x\\s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 692.656114][T31528] FAULT_INJECTION: forcing a failure. [ 692.656114][T31528] name failslab, interval 1, probability 0, space 0, times 0 [ 692.736843][T31526] XFS (loop4): Invalid superblock magic number [ 692.761360][T31528] CPU: 0 PID: 31528 Comm: syz-executor.1 Not tainted 5.2.0-rc6-next-20190627 #24 [ 692.770520][T31528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.780592][T31528] Call Trace: [ 692.783915][T31528] dump_stack+0x172/0x1f0 [ 692.788387][T31528] should_fail.cold+0xa/0x15 [ 692.792992][T31528] ? fault_create_debugfs_attr+0x180/0x180 [ 692.798809][T31528] ? ___might_sleep+0x163/0x280 [ 692.803676][T31528] __should_failslab+0x121/0x190 [ 692.808626][T31528] should_failslab+0x9/0x14 [ 692.813140][T31528] kmem_cache_alloc+0x2aa/0x710 [ 692.818007][T31528] ? perf_trace_lock+0xeb/0x4c0 [ 692.822879][T31528] ? kasan_check_read+0x11/0x20 [ 692.827758][T31528] __d_alloc+0x2e/0x8c0 [ 692.831935][T31528] d_alloc+0x4d/0x280 [ 692.835939][T31528] d_alloc_parallel+0xf4/0x1c30 [ 692.840811][T31528] ? lock_downgrade+0x920/0x920 [ 692.845680][T31528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.851943][T31528] ? kasan_check_read+0x11/0x20 [ 692.856821][T31528] ? __d_lookup_rcu+0x6c0/0x6c0 [ 692.861717][T31528] ? __d_lookup+0x42f/0x760 [ 692.866234][T31528] ? lookup_open+0x2c2/0x1a50 [ 692.870925][T31528] ? d_lookup+0xf9/0x260 [ 692.875196][T31528] ? lockdep_hardirqs_on+0x418/0x5d0 [ 692.880505][T31528] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 692.886229][T31528] ? d_lookup+0x19e/0x260 [ 692.890574][T31528] lookup_open+0x525/0x1a50 [ 692.895104][T31528] ? vfs_link+0xb90/0xb90 [ 692.899478][T31528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.905750][T31528] ? __mnt_want_write+0x1f1/0x2f0 [ 692.905799][T31528] path_openat+0x1e94/0x4630 [ 692.905815][T31528] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 692.905835][T31528] ? kasan_slab_alloc+0xf/0x20 [ 692.926079][T31528] ? kmem_cache_alloc+0x121/0x710 [ 692.931120][T31528] ? getname_flags+0xd6/0x5b0 [ 692.935814][T31528] ? getname+0x1a/0x20 [ 692.939902][T31528] ? do_sys_open+0x2c9/0x5d0 [ 692.944531][T31528] ? kasan_check_read+0x11/0x20 [ 692.949400][T31528] ? __this_cpu_preempt_check+0x1c1/0x210 [ 692.949427][T31528] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 692.949452][T31528] ? __lockdep_free_key_range+0x120/0x120 [ 692.966268][T31528] ? __alloc_fd+0x487/0x620 [ 692.966296][T31528] do_filp_open+0x1a1/0x280 [ 692.966321][T31528] ? may_open_dev+0x100/0x100 [ 692.980148][T31528] ? kasan_check_read+0x11/0x20 [ 692.985044][T31528] ? do_raw_spin_unlock+0x57/0x270 [ 692.990182][T31528] ? _raw_spin_unlock+0x2d/0x50 [ 692.995073][T31528] ? __alloc_fd+0x487/0x620 [ 692.999607][T31528] do_sys_open+0x3fe/0x5d0 [ 693.004038][T31528] ? filp_open+0x80/0x80 [ 693.008290][T31528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 693.013759][T31528] ? do_syscall_64+0x26/0x6a0 [ 693.018441][T31528] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.024520][T31528] ? do_syscall_64+0x26/0x6a0 [ 693.029204][T31528] __x64_sys_open+0x7e/0xc0 [ 693.033728][T31528] do_syscall_64+0xfd/0x6a0 [ 693.038249][T31528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.044150][T31528] RIP: 0033:0x413401 [ 693.048051][T31528] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 693.067667][T31528] RSP: 002b:00007ffbf03d9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 693.076100][T31528] RAX: ffffffffffffffda RBX: 0000000020000128 RCX: 0000000000413401 10:06:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$SG_SET_FORCE_PACK_ID(r4, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r4, &(0x7f00000001c0), 0x1000) 10:06:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000100)=0xcf6, &(0x7f00000001c0)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 693.084073][T31528] RDX: 00007ffbf03d9b0a RSI: 0000000000000002 RDI: 00007ffbf03d9b00 [ 693.092045][T31528] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 693.100024][T31528] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 693.108005][T31528] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 693.121013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 693.121034][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 693.236861][T31544] Unknown options in mask d87b 10:06:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:32 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffff9c}) accept4(r0, 0x0, &(0x7f00000001c0), 0x800) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x880) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4cb, 0xfd, 0x9, 0xfffffffffffffffd, 0xffffffffffffffff, 0xe7a, 0x0, 0x0, 0x6]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000380)={0x7, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:06:32 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) [ 693.559261][T31558] Unknown options in mask d87b 10:06:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 693.586236][T31558] Unknown options in mask d87b 10:06:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$SG_SET_FORCE_PACK_ID(r4, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r4, &(0x7f00000001c0), 0x1000) 10:06:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000001c0)) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300088000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) [ 693.882542][T31569] XFS (loop4): Invalid superblock magic number 10:06:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 694.124207][T31593] Unknown options in mask d87b 10:06:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000100000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 10:06:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='x\\s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x404480, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x22) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f00000001c0)={0x0, 0x0, {0xffffffffffffffff, 0x3, 0x5, 0x3, 0x7}}) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:06:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 694.525691][T31608] Unknown options in mask d87b 10:06:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 694.676705][T31614] XFS (loop4): Invalid superblock magic number 10:06:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r4 = dup(r3) ioctl$SG_SET_FORCE_PACK_ID(r4, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r4, &(0x7f00000001c0), 0x1000) 10:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 694.975843][T31636] Unknown options in mask d87b 10:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000008800000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 10:06:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x12, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 695.366419][T31649] Unknown options in mask d87b 10:06:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 695.484331][T31658] XFS (loop4): Invalid superblock magic number 10:06:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 695.804616][T31676] Unknown options in mask d87b 10:06:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 10:06:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x5, 0x2000) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2b, 'cpu'}, {0x2b, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'rdma'}, {0x2f, 'cpu'}]}, 0x22) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:06:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 10:06:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000088000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) [ 696.315389][T31701] XFS (loop4): Invalid superblock magic number 10:06:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000380)=""/246, &(0x7f0000000000)=0xf6) 10:06:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 696.640875][ C0] net_ratelimit: 19 callbacks suppressed [ 696.640885][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 696.652610][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 10:06:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf/\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x0, 0x0) 10:06:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 696.962860][T31735] connlabel_mt_check: 2 callbacks suppressed [ 696.962873][T31735] Unknown options in mask d87b 10:06:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r3, &(0x7f00000001c0), 0x1000) 10:06:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 697.237258][T31742] XFS (loop4): Invalid superblock magic number 10:06:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x2000000000000000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x6}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000003c0)={r5, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x3ff, 0x8, 0x82, 0x4000000000000000, 0xa8}, 0x98) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r6, 0xc0485619, &(0x7f00000001c0)={0x8000, 0x80, "aef3b1bc52518b9b37e4cc1faf3ec87f15569820316be3f4", {0x3, 0x10000}, 0x405817a3}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89e1, &(0x7f0000000100)={r0}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 697.281068][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 697.286919][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 697.290916][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 697.299409][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:06:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r3, &(0x7f00000001c0), 0x1000) [ 697.464963][T31764] Unknown options in mask d87b 10:06:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xf\\\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 10:06:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r3, &(0x7f00000001c0), 0x1000) [ 697.834795][T31781] Unknown options in mask d87b [ 697.840938][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 697.846762][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x400100, 0x0) sendmsg$nfc_llcp(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x27, 0x0, 0x2, 0x7, 0x200, 0x85a, "7ea7c5914fcd6687303025960faeb46f3dd315bf8cff25125e77cec2ec708b355dafcfcde0e6b1c439d51fa7c8acdb8ab351dfbd46f2be29397d5272455375", 0x27}, 0x60, &(0x7f0000000100)=[{&(0x7f0000000380)="2b0a1320044e15177c0634c16599d86ba00e1e9c94b58209f8742618a7b8393d2f155658377962db10c5451a7fa9810a17f314661f0a57f355da24549fd0273391a700b02ecc588e814650602440448b6325671ea4fbd2c1561eaf827f878b35bee9933ba4e01739254b1e65c99e347f3b2d28dea085990814e234e44ec0701347f098b25e326b134783a4c0284c92c6a2aa9d0a6f6a98d2acce32ad441abea1fcbee140c1778142fdd08d3a60c2db", 0xaf}, {&(0x7f0000000440)="bea92818b0894792791341dabbf46c7ac173d045d98cdb6fc2e4403f531874af3e5363b1151992eeba11862319164c1360a031635a8ab3c5905fdff419d5f86bf24a7c83a74f36f5e570e68ccede0d7d37415bb3bc932706eb61566fbe52a46b4ecd2aa76cdf56d7da3dc7f67a6d07d00a249dcde5196d5f4effcc624fc940be0e261c1cdcf8a8a2435e15c61598ab0932a924bf8469826e3b8daba059cae70201fe649b7f91285c47b719427cd330cf6d19654271c5b5f5e2107b1a3c232f7f5466e7584f830475b4d934e5e1926bbee87c62", 0xd3}, {&(0x7f0000000540)="55a1da91b9a9c6dc93d809718d7216c47ca8d2e00018403c9d8901b8c193ab144cad2f8d751fcdf38efc56eb1b019982d9e705db55383807fbc49254c09f9b18ec347646bd2a41e6acf47b0ddbcd7c0a6d78e2f88650489b68310b3da0d96731dd150ec387b6845b021cb9e72c956aba56118b23c3e7bffdc8a1d933f4340afbbd1650bf5ebcd20e58bfe4b6e921450c608e8e1c917c05cd0059db8ba04067f9df7cea38b495b966de920667d36c9bc5ff1f2388d4ec0a17761c49c278fbd923", 0xc0}, {&(0x7f0000000600)="7cdb68385aeb21453527ef6875fe4aa478df1b5084d4fa22054d7ab3fb985d1dac50f1ae1de14e6c01cfe84b6939db0d89c9b5586b3986d88cdf49335f49498f3382b6f0f9867f240787b9bf759a7af67a61e0dc58849389383de601970acd08f72045a3a46205a7a5b494540233fc30af1401558cdc2238facc323bbfcef84cce7a8ab7743524a333da5aa8b0fb2018c4062e3e89d644a6da4047e0c48d11380b441917eb45053c7aa839ab13ff0fc253dd4558801ae45d7a5fadd7678be34bebe69f3884d0874a024ca5", 0xcb}], 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/4112], 0x1010, 0x4000}, 0x4000000) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000018c0)={0xe, 0x2a, 0x12, 0x14, 0x0, 0x200, 0x2, 0x7a}) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socket$isdn(0x22, 0x3, 0x23) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) r5 = add_key(&(0x7f0000000700)='pkcs7_test\x00', &(0x7f0000000740)={'syz', 0x0}, &(0x7f00000018c0), 0x0, 0xfffffffffffffff8) r6 = add_key(&(0x7f0000001980)='keyring\x00', &(0x7f00000019c0)={'syz', 0x1}, &(0x7f0000001a00)="7dcb7ff1bcafdf48422f0812a7f83092ed92c28a5cc2e1f09d3f65043338227e78bea8d219984d1ec42a4b1cffab7045a6b96f01e5c50f7083af6860b3052a85ad0b9d87888fe30a04b682b22d", 0x4d, 0xfffffffffffffffa) keyctl$link(0x8, r6, r6) keyctl$search(0xa, r5, &(0x7f0000001900)='.dead\x00', &(0x7f0000001940)={'syz', 0x1}, r6) ioctl$void(r1, 0xc0045c79) openat$pidfd(0xffffffffffffff9c, &(0x7f0000001a80)='/proc/self\x00', 0x181000, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r3, &(0x7f00000001c0), 0x1000) [ 698.193065][T31800] XFS (loop4): device supports 512 byte sectors (not 0) [ 698.307208][T31813] Unknown options in mask d87b 10:06:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000001000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) [ 698.480860][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 698.486707][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xf\\\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) [ 698.709033][T31830] Unknown options in mask d87b 10:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000011000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:38 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x5, 0x5, 0xcb}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0x9fc) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:06:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 698.984478][T31845] XFS (loop4): device supports 512 byte sectors (not 0) 10:06:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 699.133142][T31859] Unknown options in mask d87b 10:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r3, &(0x7f00000001c0), 0x1000) 10:06:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800200"/63, 0x3f}], 0x0, 0x0) 10:06:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 699.576862][T31878] Unknown options in mask d87b 10:06:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 699.752875][T31887] XFS (loop4): device supports 512 byte sectors (not 0) [ 699.880159][T31898] Unknown options in mask d87b 10:06:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 10:06:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 700.230482][T31915] Unknown options in mask d87b 10:06:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r3 = dup(r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r3, &(0x7f00000001c0), 0x1000) 10:06:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 700.461377][T31919] XFS (loop4): device supports 512 byte sectors (not 0) 10:06:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f00000001c0)={0x3165e09b29ea37, @time, 0x100000001, {0x9, 0xffffffff}, 0x8, 0x0, 0x88}) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000380)="8c990622c9c01a83c0502ffac7499317d2609bba3e7770635f1be3bf203197f447b0c6d779f33e5c32eb8d4d76deb1c54fef6472d2364d80e53cab2c8cff11ce1b7b9f7e8a643d4147cfe9cf69f14b2bd0ba6f2f913809f3319cb2630d3b63025d6b4e9c6ad0f312896bf5da05e9091be38af1997a0c422801a8e765b78751e661b4ca4f9730b9313eb8e83513e2335a6b6c6abfc9b97a62b1a653e8f2290fe3c7ecfc640b030cc8b348bd9a9f786b7bc9cb26247e87a29b69") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:06:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 700.694703][T31940] Unknown options in mask d87b 10:06:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 10:06:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2400, 0x0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000100)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 701.323446][T31969] XFS (loop4): device supports 512 byte sectors (not 0) 10:06:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c00000100001000000000010000", 0x5e}], 0x0, 0x0) 10:06:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000008800000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:06:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 702.000891][ C0] net_ratelimit: 19 callbacks suppressed [ 702.000905][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.012593][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 702.060111][T32009] XFS (loop4): device supports 512 byte sectors (not 0) [ 702.134829][T32022] connlabel_mt_check: 4 callbacks suppressed [ 702.134840][T32022] Unknown options in mask d87b 10:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:06:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 702.485019][T32037] Unknown options in mask d87b [ 702.504572][T32037] Unknown options in mask d87b 10:06:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 10:06:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 702.640897][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.646765][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 702.652683][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.658469][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) read(r2, &(0x7f0000000380)=""/198, 0xc6) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'netdevsim0\x00', {0x2, 0x4e23, @remote}}) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:06:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 702.880968][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.886807][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 702.930137][T32062] Unknown options in mask d87b [ 703.031782][T32061] XFS (loop4): SB sanity check failed [ 703.056660][T32061] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 10:06:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 703.148000][T32061] XFS (loop4): Unmount and run xfs_repair 10:06:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 703.188415][T32061] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 703.225243][T32061] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 703.257623][T32061] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 703.330631][T32061] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 703.382246][T32089] Unknown options in mask d87b 10:06:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:06:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x45) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f00000001c0)={0x7, 0x7, 0x1, 'queue0\x00', 0x99a3}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:06:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 703.503860][T32061] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 703.520887][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 703.520930][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 703.599524][T32061] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 703.665553][T32061] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 703.726780][T32061] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 703.736682][T32061] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 703.790123][T32061] XFS (loop4): SB validate failed with error -117. 10:06:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 10:06:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x2, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 704.270082][T32120] Unknown options in mask d87b 10:06:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:43 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 704.565030][T32135] XFS (loop4): SB sanity check failed [ 704.590590][T32135] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 704.659777][T32146] Unknown options in mask d87b 10:06:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 704.722664][T32135] XFS (loop4): Unmount and run xfs_repair 10:06:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) r4 = fcntl$dupfd(r0, 0x406, r3) write$P9_RRENAME(r4, &(0x7f0000000b00)={0x7, 0x15, 0x1}, 0x7) r5 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xffffffffffffff65, 0x28900) ioctl$TCSETSF(r5, 0x5404, &(0x7f00000001c0)={0x541, 0xfff, 0xeb9, 0xdea2, 0xf, 0x57a1, 0x3, 0x3, 0x5, 0x3, 0x3, 0x2}) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000200)={r0, r5}) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xdca}}) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) epoll_ctl$EPOLL_CTL_DEL(r7, 0x2, r1) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000080)={0x8, 0x3}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000540)={{{@in=@initdev, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) perf_event_open(&(0x7f0000000a80)={0x0, 0x70, 0x2, 0x2, 0x14, 0xfffffffffffffffa, 0x0, 0x84, 0x1, 0x0, 0xaf, 0xffffffffffff8a58, 0x7, 0x7, 0x1, 0x8, 0x0, 0x6, 0x9, 0xc684, 0xfff, 0x1ff, 0x7, 0x8, 0x7, 0x7, 0x2, 0xcb, 0x4eb, 0x5, 0x400, 0x9, 0x0, 0xfffffffffffffff9, 0xffffffff7fffffff, 0xfffffffffffffffd, 0x4, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x1770, 0x8}, 0x2114, 0x3, 0x0, 0xf, 0x7f, 0x8, 0x10000}, 0x0, 0xe, r2, 0x3) getresgid(&(0x7f0000000680)=0x0, &(0x7f00000006c0), &(0x7f0000000700)) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000740)=0xe8) syz_mount_image$hfs(&(0x7f0000000240)='hfs\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x3, &(0x7f00000004c0)=[{&(0x7f00000003c0)="aa96d9cb6a11e179322279f0537317a4f7486bd3e164624a184223d0ddad8aeb069f4c5c6f821d6f4dc5a7826e552b74cac26da3bf3c98221cdb0aa95d2eb682c1aa3eb35f80187246b2e6294bb3396f8ae81b461cce8145ef2fe89b8c1ac36322e9b5e311b8b40eb78a1f8c5ef82a53", 0x70, 0x1f}, {&(0x7f0000000440)="473644e12e", 0x5, 0x7fff}, {&(0x7f0000000480)="5b0c0496c7c37b749e1eedfbc47c759537ecd37b0207f69c556db7da", 0x1c, 0x2}], 0x2280000, &(0x7f0000000980)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r8, @ANYBLOB=',file_umask=00000000000000000000057,session=0x0000000000000009,quiet,uid=', @ANYRESHEX=0x0, @ANYBLOB=',f\x00\x00e_umask=00000000000000000000007,gid=', @ANYRESHEX=r9, @ANYBLOB=',obj_role=/dev/kvm\x00,audit,fowner<', @ANYRESDEC=r10, @ANYBLOB=',mask=^MAY_WRITE,\x00']) ioctl$KVM_RUN(r6, 0xae80, 0x0) 10:06:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 704.791855][T32135] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 704.826062][T32135] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 704.843609][T32135] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 704.909865][T32135] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 704.946225][T32135] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 705.027648][T32135] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 705.068912][T32135] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 705.078128][T32166] Unknown options in mask d87b [ 705.137860][T32135] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 705.168875][T32135] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 705.187854][T32135] XFS (loop4): SB validate failed with error -117. 10:06:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700", 0x6e}], 0x0, 0x0) 10:06:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:44 executing program 2: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="07950400000000eea77ce74fb58ddf0000356317b447d19ecd38b972a4220aaea757a85b0700000000000000023f0683a2aaa98207af2c1e2f6d8908a500000000000000ef", 0x45) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x2080000000004, 0x800000000011, r0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) wait4(r1, &(0x7f00000000c0), 0x6, &(0x7f0000000100)) clock_settime(0x0, &(0x7f0000000040)={0x0, 0x989680}) r2 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x10000, 0x200000) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 10:06:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 705.778282][T32189] Unknown options in mask d87b 10:06:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 705.911696][ T12] XFS (loop4): SB sanity check failed [ 705.923518][ T12] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 705.983619][ T12] XFS (loop4): Unmount and run xfs_repair [ 706.009592][ T12] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 706.057902][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 10:06:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 706.113627][T32214] Unknown options in mask d87b [ 706.119626][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 706.156277][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 706.184724][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 706.197679][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:06:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 706.214608][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 706.250097][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 706.282700][ T12] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 706.304375][T32199] XFS (loop4): SB validate failed with error -117. 10:06:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 10:06:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000088000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 707.013927][T32248] XFS (loop4): SB sanity check failed [ 707.028459][T32248] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 707.040964][ C0] net_ratelimit: 19 callbacks suppressed [ 707.040974][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 707.052588][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 707.110951][T32248] XFS (loop4): Unmount and run xfs_repair [ 707.135421][T32248] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 707.211236][T32248] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 707.248984][T32263] connlabel_mt_check: 2 callbacks suppressed [ 707.248994][T32263] Unknown options in mask d87b 10:06:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000001100000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 707.282077][T32248] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 707.315972][T32248] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 707.358429][T32248] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 707.401890][T32248] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 707.477243][T32248] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 707.531629][T32248] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 707.569123][T32276] Unknown options in mask d87b [ 707.583815][T32248] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 707.628860][T32248] XFS (loop4): SB validate failed with error -117. [ 707.680878][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 707.680884][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 707.680936][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 707.686742][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 10:06:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:47 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 708.089941][T32292] Unknown options in mask d87b 10:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 708.240962][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 708.246888][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 708.313251][T32305] XFS (loop4): SB sanity check failed [ 708.321510][T32305] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 10:06:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\f', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 708.391193][T32305] XFS (loop4): Unmount and run xfs_repair [ 708.397606][T32305] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 708.448107][T32319] Unknown options in mask d87b [ 708.460385][T32305] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 708.481434][T32305] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 708.549676][T32305] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 708.576944][T32305] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:06:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 708.599234][T32305] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 708.670981][T32305] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 708.720981][T32305] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 708.753503][T32305] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 708.787722][T32305] XFS (loop4): SB validate failed with error -117. [ 708.874606][T32334] Unknown options in mask d87b [ 708.880953][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 708.886803][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a402000100001007000000000000000000", 0x76}], 0x0, 0x0) 10:06:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:48 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 709.364610][T32353] Unknown options in mask d87b 10:06:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 709.585621][T32360] XFS (loop4): SB sanity check failed [ 709.595615][T32360] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 709.666388][T32360] XFS (loop4): Unmount and run xfs_repair [ 709.683794][T32368] Unknown options in mask d87b [ 709.702837][T32360] XFS (loop4): First 128 bytes of corrupted metadata buffer: 10:06:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xff', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 709.738825][T32360] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 10:06:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 709.791945][T32360] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 709.842516][T32360] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 709.869992][T32360] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 709.916906][T32360] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 709.981067][T32360] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 710.016420][T32383] Unknown options in mask d87b [ 710.018068][T32360] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:06:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xff', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 710.038286][T32360] 00000070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 710.048014][T32360] XFS (loop4): SB validate failed with error -117. 10:06:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 10:06:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs(', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:49 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xff', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 710.594018][T32404] Unknown options in mask d87b 10:06:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xfc', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 710.783492][T32414] XFS (loop4): SB sanity check failed [ 710.801067][T32414] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 710.841180][T32414] XFS (loop4): Unmount and run xfs_repair [ 710.851399][T32414] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 710.873249][T32414] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 710.911707][T32414] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 710.955283][T32424] Unknown options in mask d87b [ 710.961498][T32414] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. 10:06:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 711.025587][T32414] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 711.061201][T32414] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:06:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf6', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 711.090001][T32414] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 711.100075][T32414] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 711.111243][T32414] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 711.121353][T32414] XFS (loop4): SB validate failed with error -117. 10:06:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 10:06:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsX', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xfe', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 711.837140][ T12] XFS (loop4): SB sanity check failed [ 711.846612][ T12] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 10:06:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 711.919172][ T12] XFS (loop4): Unmount and run xfs_repair [ 711.940407][ T12] XFS (loop4): First 128 bytes of corrupted metadata buffer: 10:06:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 712.006409][ T12] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 10:06:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 712.061841][ T12] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 712.115049][ T12] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 712.149696][ T12] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 712.171853][ T12] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 712.219460][ T12] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 712.253624][ T12] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 712.274730][ T12] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 712.328495][T32463] XFS (loop4): SB validate failed with error -117. [ 712.401147][ C0] net_ratelimit: 20 callbacks suppressed [ 712.401156][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 712.412777][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c09", 0x7a}], 0x0, 0x0) 10:06:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xff', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:51 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 712.896636][T32507] connlabel_mt_check: 5 callbacks suppressed [ 712.896647][T32507] Unknown options in mask d87b 10:06:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 713.010714][ T9439] XFS (loop4): SB sanity check failed [ 713.020296][ T9439] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 713.040896][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 713.046800][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 713.052720][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:06:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 713.058516][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 713.085729][ T9439] XFS (loop4): Unmount and run xfs_repair [ 713.116921][ T9439] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 713.145795][ T9439] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ 10:06:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 713.199023][ T9439] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 713.244925][ T9439] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 713.280996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 713.286968][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 713.289626][ T9439] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 713.311712][T32529] Unknown options in mask d87b [ 713.344012][ T9439] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ 10:06:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 713.403859][ T9439] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 713.426737][ T9439] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:06:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs@', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 713.470704][ T9439] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 713.540878][T32514] XFS (loop4): SB validate failed with error -117. [ 713.655123][T32543] Unknown options in mask d87b 10:06:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 10:06:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 713.921020][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 713.921064][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 713.979964][T32562] Unknown options in mask d87b 10:06:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x94', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 714.224264][T32572] XFS (loop4): SB sanity check failed [ 714.232032][T32572] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 714.269337][T32581] Unknown options in mask d87b [ 714.285660][T32572] XFS (loop4): Unmount and run xfs_repair [ 714.301064][T32572] XFS (loop4): First 128 bytes of corrupted metadata buffer: 10:06:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 714.361613][T32572] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 714.381045][T32572] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 714.441689][T32572] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 714.488090][T32572] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 714.521350][T32572] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 714.571027][T32572] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 714.594305][T32572] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... 10:06:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x9c', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 714.613625][T32572] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 714.635727][T32594] Unknown options in mask d87b [ 714.653652][T32572] XFS (loop4): SB validate failed with error -117. 10:06:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 10:06:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:54 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000001100000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:06:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xa0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 715.216569][T32616] Unknown options in mask d87b 10:06:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000008800000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xcc', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 715.401747][ T9439] XFS (loop4): SB sanity check failed [ 715.419744][ T9439] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff [ 715.483557][ T9439] XFS (loop4): Unmount and run xfs_repair [ 715.520239][ T9439] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 715.541830][T32636] Unknown options in mask d87b [ 715.544114][ T9439] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 715.597794][ T9439] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 10:06:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 715.644911][ T9439] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 715.685116][ T9439] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ 10:06:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 715.722049][ T9439] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 715.783829][ T9439] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 715.827708][ T9439] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 715.871105][ T9439] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 715.926825][T32622] XFS (loop4): SB validate failed with error -117. [ 715.934370][T32649] Unknown options in mask d87b 10:06:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c090804", 0x7c}], 0x0, 0x0) 10:06:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe6', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:55 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 10:06:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:06:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:55 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) [ 716.539077][T32667] Unknown options in mask d87b 10:06:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xff', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsN', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 716.801753][T32678] XFS (loop4): SB sanity check failed [ 716.807229][T32678] XFS (loop4): Metadata corruption detected at xfs_sb_read_verify+0x418/0x540, xfs_sb block 0xffffffffffffffff 10:06:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) [ 716.906011][T32678] XFS (loop4): Unmount and run xfs_repair [ 716.931037][T32678] XFS (loop4): First 128 bytes of corrupted metadata buffer: [ 717.020896][T32678] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 717.061818][T32678] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 717.115806][T32678] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 717.151780][T32678] 00000030: 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 ................ [ 717.186092][T32678] 00000040: 00 00 f9 ff ff ff ff 80 00 00 00 00 00 00 00 82 ................ [ 717.219235][T32678] 00000050: 1c 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 717.271599][T32678] 00000060: 00 00 06 c0 34 a4 02 00 01 00 00 10 07 00 00 00 ....4........... [ 717.290219][T32678] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 04 00 00 00 00 ................ [ 717.309856][T32678] XFS (loop4): SB validate failed with error -117. [ 717.440891][ C0] net_ratelimit: 19 callbacks suppressed [ 717.440900][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 717.452421][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:06:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 10:06:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x8c', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:06:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 10:06:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:57 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 10:06:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x94', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000008800766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) [ 718.080938][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 718.080983][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 718.086841][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:06:57 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r0, &(0x7f00000001c0), 0x1000) [ 718.212397][T32743] connlabel_mt_check: 2 callbacks suppressed [ 718.212406][T32743] Unknown options in mask d87b 10:06:57 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000200)={0x0, 0x2, 0x1, {0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x96000}]}}}) 10:06:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:06:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x9a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:57 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x2, &(0x7f0000000240)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x41f00, 0x1, [], 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$TUNSETLINK(r3, 0x400454cd, 0x33f) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)=',cpuset\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139f26120"], 0xc) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r6 = socket$kcm(0x29, 0x5, 0x0) r7 = perf_event_open(0x0, 0xffffffffffffffff, 0x6, r5, 0x0) r8 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r7, 0x0, 0x8, &(0x7f0000000200)='keyring\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r8, r2, 0x0, 0x1b5, &(0x7f0000000880)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00', r9}, 0x30) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) [ 718.640928][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 718.646793][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 718.689806][T32762] Unknown options in mask d87b 10:06:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000088000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:06:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x9e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 719.161375][ T318] Unknown options in mask d87b 10:06:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x7f', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 719.280933][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 719.286894][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 719.292853][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 719.335788][ T320] device nr0 entered promiscuous mode 10:06:58 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xff', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:06:58 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 719.710462][ T342] Unknown options in mask d87b [ 720.222202][ T317] device nr0 entered promiscuous mode 10:06:59 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r1, &(0x7f0000000580)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000400)="aea351a8ff28e9f57233c0f323e3e8", 0xf}], 0x1}, 0x40) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x2, &(0x7f0000000240)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], 0x0, 0x0, 0x1f, &(0x7f0000000c00)=""/31, 0x41f00, 0x1, [], 0x0, 0x1f, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) ioctl$TUNSETLINK(r3, 0x400454cd, 0x33f) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)=',cpuset\x00') write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="5fedca6eefce323139f26120"], 0xc) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r6 = socket$kcm(0x29, 0x5, 0x0) r7 = perf_event_open(0x0, 0xffffffffffffffff, 0x6, r5, 0x0) r8 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r7, 0x0, 0x8, &(0x7f0000000200)='keyring\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r8, r2, 0x0, 0x1b5, &(0x7f0000000880)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00', r9}, 0x30) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xae\xff\x045\x83\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xbd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x16\xc3Z\xa38tu\xdbN\xb8\x1e\x95\xafyB\xf4X\x05\x00\x00\xe95\xa1\x00\x00') write$cgroup_subtree(r4, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0xfdef) 10:06:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:59 executing program 2: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:06:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:06:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:06:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 720.699750][ T369] Unknown options in mask d87b 10:07:00 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 10:07:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x23, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:00 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 10:07:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x5d, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 721.100128][ T394] Unknown options in mask d87b [ 721.346814][ T396] device nr0 entered promiscuous mode [ 721.377793][ T404] XFS (loop3): Mounting V4 Filesystem [ 721.428845][ T404] XFS (loop3): empty log check failed [ 721.453600][ T404] XFS (loop3): log mount/recovery failed: error -5 [ 721.551950][ T404] XFS (loop3): log mount failed 10:07:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/65, 0x41}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x14, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) recvfrom$inet(r1, 0x0, 0x10000002c, 0x0, 0x0, 0x800e0054e) shutdown(r1, 0x0) 10:07:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:01 executing program 2: syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r0, &(0x7f00000001c0), 0x1000) 10:07:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsP', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 722.040532][ T424] Unknown options in mask d87b 10:07:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)=""/41, 0x29}, {0x0}, {0x0, 0x240}], 0x3, 0x0, 0x5d}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000140)=""/192, 0xc0}, {0x0}, {0x0, 0x235}, {0x0, 0x7a}], 0x4}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) readv(r1, &(0x7f0000000840)=[{&(0x7f0000001c80)=""/251, 0xfb}, {0x0}], 0x2) shutdown(r4, 0x0) shutdown(r1, 0x0) 10:07:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0x5d000000, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 722.403721][ T447] Unknown options in mask d87b 10:07:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfsZ', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000110000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 722.670060][ T463] Unknown options in mask d87b 10:07:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x3, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000880000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 722.800887][ C0] net_ratelimit: 15 callbacks suppressed [ 722.800897][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 722.812492][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 723.026722][ T479] Unknown options in mask d87b 10:07:02 executing program 4: r0 = socket$inet(0x2, 0x4000000002, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0x2ec8, 0x4) setsockopt$inet_int(r0, 0x0, 0x100000000000017, &(0x7f0000000080)=0x7c5, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x0, 0x0}, 0x40002102) 10:07:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x5, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:02 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0xf, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x94', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x80fe, 0x3, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300004, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 723.364055][ T498] Unknown options in mask d87b [ 723.440870][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 723.446728][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 723.452657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 723.458461][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) unshare(0x8000400) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000000c0)) [ 723.680863][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 723.686714][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 723.692975][ T512] Unknown options in mask d87b 10:07:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xa0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x300, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 724.061478][ T525] Unknown options in mask d87b 10:07:03 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)=""/41, 0x29}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000140)=""/192, 0xc0}, {0x0}, {0x0}], 0x3}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) readv(r1, &(0x7f0000000840)=[{&(0x7f0000001c80)=""/251, 0xfb}, {0x0}, {0x0}], 0x3) shutdown(r4, 0x0) shutdown(r1, 0x0) 10:07:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0xff00, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000008800766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 724.320904][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 724.320910][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 724.402931][ T545] Unknown options in mask d87b 10:07:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x18cd03, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 724.650993][ T563] Unknown options in mask d87b 10:07:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc6', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0b") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 10:07:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) read(r0, &(0x7f0000000200)=""/164, 0xa4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) shutdown(0xffffffffffffffff, 0x0) recvfrom$inet(r1, 0x0, 0x10000002c, 0x0, 0x0, 0x800e0054e) shutdown(r1, 0x0) [ 724.995486][ T578] Unknown options in mask d87b 10:07:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0xffffff1f, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xd4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 725.338490][ T593] Unknown options in mask d87b 10:07:04 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000002c0)) mknod$loop(&(0x7f0000000380)='./file0\x00', 0xa001, 0x1) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="bd8870e2fe46725248d3d628571a9fad877e389e2174b5c2c7e1e9423380e5e9f1d9c71fcadfcf89a227d161be1d50d67bc99fbc3d7b09cda0b9f3008e76031916225f0da0038bf01cb67a9c3609a6efcd809ffe467bbdd3cef24236f9e8633c820cc409713b4574d93b47b28cc00061f309e85c3102f3d2d04446f430689bbbc336ea1c08e456ed0b3e9a8e2056d85079796e1ca78602066a5c6f6cc953a4dbbd1614360a3d9e60fa34cfaf8b2639d9fa61ab02be3f68736cc28862d14b02ae81bac7828776adb3f65cd967f947e810ca5ae264fe6fc2dbfa8ac064a7448b38b146ed47040fa96a30939d288d9826d8f3f0848d66fae663c37481264ea13dd3bced1886c2dd56901eb8480899418776c156d21ac64ad958842b6a31228c9893a1700263a2fb6bd42c1b2b53bfdb7393f89851c1956f3714cb78957fb5ee006221d7d5191fa176ec6d536c55f3ced73a7f17c3bc39bc5835b47c9a73ae3b31b9865fea4014647a857bc6196234f1fd75b8253a34696381a6ef85572f33396ff81d598fd7981d20477964c5361bd0322e03e2740f347b2a1cc077ebc6ea73a0154353e287216266ad7805e0f11bdcb997994c78e203a15315cebe65842146c248d794acf5f017083e1d12974b29ad1c9e5c77ca8f6d24b4f84d5c1ebffbce141d0537b52f3f4d4c025879edd85585a83679756a17ed49de8a508db794f430ba95743ac6e99becab4d37ebd2faab414c1c7e945141b1f9e9f1cde7815ccf30f489dbbeb8439116d2bd59b88e79584f85a94a346cfc5d21f414db0e6dc6134021c951cb67e446cc52c2ad6776ae3d38bceea19ec894a48b1bf35cd185c061f67295c2f0f9c102ac0ea1088aa4f28e4ee8b938befd0cb5c927416765084de219dbee4e7f45051438ec23cdc0e7164d840febc2bd15cd53a1ebc0006c6554ad1eea485163f01512bf6b46d33a1422cf91626d95e3522902de35349fba3cd9d97f193ca45e55e91e48162c501671f24421a7b551c0f1def8e3e9d8826306c7b3c569e0d44693d273c312c037e7ea3e15d41e8d9774535cb64254b65fc8e6b72bfa61654c8dac74548ca9d8be1f3d42bb2d0ab5f7203d8528045f170fc04ea445adefcdd74517d9b85eace04ea64e7aa3b740bee4be22b6b353f2cc481a1d36bde48736ef377c710c068b25a77837fb5e391914b9d558cdde2d3016372f8dc4507b0c78dcb9258b71fa1c39aca5d91e02e86c33eb950abf0bdc0593cd73bcc67f27e18a293a229f08209e545d92b9c72955add3869f41da744c4cb89c623f9d044de730c297d6356eca8e58146dc259228559695f142029d16bf420c26daec25d014ae9cc8023668e7d63b1fab91d70cad6f4d161df93be4d9fee05b2a846a52bb41ac50fe19789fc182b623c479a2298e5f36dc34956c74e9de0d23822add5b1b6ea62e079fb74bf1cefcdbc3fb90194e592fbb2c470af16a8a1789724a35e897d76e14aa4162d9c30427c29a60b7752624c4c45a1d584fd6c57f93c6c664a48b8d546f599ed6104ff564b4636f373bc661a00ac5a4f6abaeb91dcb35e0c2b2c18cf8e4f80bef4b98a7a68010a2a39059d988a0d2dfbd6845bece9202d02a84ef67248f1a3d99cd6de995e4b5bec151504d02bbf953780c1fc347962cb58cc084a1efe9fed8487a6c70efa1f12117dd6c03c88cf8b2c7bc08abeea299a2d244f941a1c5958d522d5df0cfdab66603c1146ba82a8c98cd82fb5bfcb160307ff8aa5c54251a6e4a7f63ac2bcc69abe932a3b9fdd8324aeea2be7d92bcfa29b4741822d44d1b35e6886bae4b30d4c447c6614237f4533a3fd52f5508f88f8189380ad21365907ae8ef82cd4f28e0917e8803133c7a13b820e118608c4e0306ebf3cbb432193d87449480f2c8ee027aa7c1f66456cbb49f6a3a459b6b5132ced1e6e1dcc678d59cea3f663c450fbf0a1c85936cdc7ae8c06e7f919a18a284faf6fe7f56b6fd02406b335303b3a906fa7a6608fb45606145a8cf0c9abe1796992aaf99d3bc0633b0743874d22dcf19ac6b605225ed8d4f8bb63b5d7dd462aadd762f8e2391842f4169d75ddc36a9003b82f0dbbc805b16418e0feda72d970682de063f2d0e4bdca6995f9ce091c5dcfca305437794ce2928159f343f25e1f0637c3e0116c627559591db5b940ee9992fbbecc9aec8c58f1dd2fd47bdba621bb0fa27eb1fdf0006999317bb6a74b49a569e369747e8315ecc5fc2de732879ad4af439d9bf742a839c57e263de8450c7b5306a43029066ae9a0c3e728e265b18dfd5c3209c926e6b6bdb6c0932673f4cd2e810400187e2cfe08e44b98dc5b749f4f2a46cf17176bc4baa2173b95cb3134c701d23341b011a5a803208c2a78a6f6baf05e35d6aaf0f3765f8c4614f1176cdc4e10139ee71ab2a5c12e1829d53afec5f3cfd5b0ae5992ed74ed2f3fdf5054e6dcff906c46453dcb9af961c6e49892ac07258004baa98a00eebf9839be355c7d43e5341e8f7af44a2b912e476ce8b69cd37b7335183a671a2720023e117130830e841d9a3beea1d41aa773a46a88c6b64a53e6b645e52d13b30fe078860c81f820e83933a5ba8d42c9e63a81be4e51a4f3892fb7d02afa93bc36f0a3f8225968d97e3c787a675723f166ff69b8e8a8c39489d274fab9c952267dcbdbefb1f60a637055890e5989b410ac1023ae6b0d60af2f26367185da8c0111208a6a658c88cf5b7a96b853eed3cc28200076fc9ff304bd1555d58886eef0124d1b0b9f5172d957a3a191f3e6971ab842fb271e058b4a6bdd7b2c41e9569c25f26825c5dbc71e299c9d5f3a5f7ae68e8fb9682e00c3ced26a003c6a4cf100cb359b565440380c97dad60acf0417f0b86a7ab327c70776e120f582cb8137d278b40a3906af6da2f5da4c0910f5cacffffd4868bf48937cf0bd35dc30053f4af76bdd346d40f6c4061cec68aafd0e128e82bae9ee3a625c13b81df17024223b98f056df8e1981f92a037c9a62ab5387ff284ec3fe5a1c48eaeb9fedd4c175d9aaa6ed024ae3668f2f755fcdeb96f927a25871fdabc09888146e458978f3bb2fc7535c6d53d5f1ca24aea94c5e4ad6b9e944a8253f14cf256a53bc3ff1186df90911660df150a69834e61bc0bf2949d519f4b2cc999caea4e220ca8747b19c57aedfb5f0f44c868f4a835ba72a49cda234014eddc414060ded40b40824f4019121245bea9cf6019501141b12e2134f118cf6ad424d0e3097416d85c6fe4564a337cc5c921f0416188a7f080f35714266eaa1894538cba23c77a688a59cfd6ab7ff3fdc99bca525920d5d037b1afba038abbe4f75c71a481c440ad696f3aaecceaac741f0466b7d4790314797e5ba4fb469e05c3e952aedfd6d601bb6017cd374893d3ac0f48268a06585278d8ea9db1d4c4f1076c8012dba76e6bb45fbff4908071bdf7e7ea3e080c148130016babda2694911abbef8c87bf9dc7ed446f1060daa8c3dca7ea7ed4d62e3cd24971509d3f872c94eb5b4e42f6ba9e1d589114fc7a0f5e463c2a4001efa6b2f2311fcc14868d18d21fd55fbb6b581f5e182b64bdfc2bf6cb4694de4628784f907f7f7c12ab2229a578a90fabfab57e9a498d004625ea8014c94c0e8873ae3ff78ad955f1ce532f47a97ab4f81f505ab49f88b0d685852c74e2100e9cbd91405c20416e4f846b8a70b998074f7fd0e9a6ec70bfb6b6d4715a3b50026dff71a14a59b0a9ba438257b69b84de25e6885b413181d8cc768741962ee02cce2d7b9692caccb4cd372d2a5f90887fe595e9b615792cdf3d38829837eb6bfc534d6634e65420a11d78bc204cdb8e100f338df39832438f55592c0289fc540f2f27e7576e07f9a790635f9503b259bf0d83901d0a1e50ceeb47ae67413321c4414a4cb77cd6c8238f22011f28f245a2c158d40f5a717cd2b899cc43ee1f6ef1f1f645fcd532c587034236be4abc838724fb544c3eb2064f0ca3b19308ca730292fa6c617a8cde1a51e5711759ae94265cba7046b472949ec0efc9b23e9c61e3a990550acd693c62d426aa7308b63270dd70c8d1d29b706a8061ca1a344029b16760b18207c82161d88621a8a62b2e697684d7ce112ebffadd37194b79a6dce656dde7095e9845b837769f1b9522d903f44885f5e052a17834b124f6c629f2d1a0cb661167b5332069f91d89f4b98ffdb093eadfa41102fd8bc9fcdb24a393628902580761f3e73ec5f35efffbecab23d5f52992c785c530e024470b944be8d3c565d608f5f4ac12a3a038a5c3d1460d6bbfa5f1072ccb68b400dff90713304dbee5da0400b61d46f95d2ad70fddabe6a19fbe233144533661ac160366352b686d43282695a012a38e93d0568e5418c5f95d8879ca0ba1da845133b74373fe9616037d7287c43eb9254e089bd203ec2d4f01bfa322e8ddfa6f001d65b99d94789955b0695152078305b28b7f92dd5fc5bc1cdf5bcb84c87797b3163671e239a6dd24b4cf58ea84b1c9306650f4f45bc505a7289ba8e7491c3dcca3140da52175c18598e21631c0e10c904ba5a05e31324171a50d0dd864e9e74e7a67b554bbfdfd3245352954cacd411e11a366a971c949016d9938f3ccb3b54d34f51edc196951419bcc6d844a82681d5e96ac1cbbde69af1bfb7222c3e94b264870913fdda94ad1e49c5537cdd8e170312cd485234f813ce9724644457290255fb4d353dccb1e88f72c2b3aebe399c13119c5bfe428fbfd603244e67f0dfb2d0b2199a0285a104604f540823f30fc85705cb99926bfeeea02c7e40496f742e191f6bb40f5de23850e84d5e87fd13ca5ce68123d14b", 0xd5a, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 10:07:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xd8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:04 executing program 4: syz_emit_ethernet(0x33e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x2, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4029, 0x0, @local, @dev={0xac, 0x70}, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0xffff80fe}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) [ 725.657436][ T610] Unknown options in mask d87b 10:07:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0b") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:05 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) write$binfmt_script(r0, &(0x7f0000001700)=ANY=[], 0x469) sendto$inet(r0, &(0x7f00000009c0)=' ', 0x1, 0x4000003, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000a40)="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", 0x236, 0x4000, 0x0, 0x0) [ 726.098542][ T629] Unknown options in mask d87b 10:07:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30880000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5d46534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 10:07:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 726.430496][ T645] Unknown options in mask d87b 10:07:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="585d534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0b") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:06 executing program 4: poll(&(0x7f0000000000), 0x2000000000000010, 0x8000000004e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xffffffdd, 0x0, 0x0, 0x800e00a35) ppoll(&(0x7f0000000000), 0x58, 0x0, 0x0, 0x159) shutdown(r0, 0x0) 10:07:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465d4200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xea', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534202001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534203001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000110000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534204001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7b") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf2', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534205001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 727.840868][ C0] net_ratelimit: 20 callbacks suppressed [ 727.840886][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 727.852576][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:07 executing program 4: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000380)='./file0\x00', 0xa001, 0x1) add_key(&(0x7f00000003c0)='big_key\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)="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", 0xe00, 0xfffffffffffffffe) 10:07:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534206001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/238, 0xee}, {0x0}, {0x0}], 0x3}, 0x2) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xbf7f9254, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = dup(r2) recvfrom$inet(r1, 0x0, 0x0, 0x82, 0x0, 0x0) recvfrom$inet(r3, 0x0, 0xe5, 0x0, 0x0, 0x800e00545) shutdown(r3, 0x0) 10:07:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534207001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 728.480911][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 728.480947][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 728.486832][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 728.573036][ T753] connlabel_mt_check: 6 callbacks suppressed [ 728.573046][ T753] Unknown options in mask d87b 10:07:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7b") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xfc', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534208001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 728.941668][ T767] Unknown options in mask d87b [ 729.040898][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 729.046729][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x145}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 10:07:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200031000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200051000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:08 executing program 4: [ 729.314803][ T783] Unknown options in mask d87b 10:07:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 729.354870][ T781] XFS (loop3): Mounting V4 Filesystem [ 729.416146][ T781] XFS (loop3): empty log check failed [ 729.456783][ T781] XFS (loop3): log mount/recovery failed: error -5 [ 729.580954][ T781] XFS (loop3): log mount failed [ 729.631481][ T805] Unknown options in mask d87b [ 729.680897][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 729.686859][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 729.692808][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:07:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7b") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200061000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:09 executing program 4: 10:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 730.026696][ T817] Unknown options in mask d87b 10:07:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200071000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:09 executing program 4: 10:07:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:09 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x8, 0x2, &(0x7f00000015c0)=[{0x0, 0x0, 0x100000001}, {0x0}]) 10:07:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342003f1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 730.372394][ T834] Unknown options in mask d87b 10:07:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 730.425237][ T836] XFS (loop3): Mounting V4 Filesystem [ 730.489746][ T836] XFS (loop3): empty log check failed [ 730.512259][ T836] XFS (loop3): log mount/recovery failed: error -5 [ 730.631017][ T836] XFS (loop3): log mount failed 10:07:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be0") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200401000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:10 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vcan0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x1, 0x0, 0x0, {0x0, 0x2710}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "a0440a32e9cd1c14"}}, 0x48}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)={0x3, 0x0, 0x0, {}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "244e208387e3322b"}}, 0x38}}, 0x0) [ 730.709948][ T856] Unknown options in mask d87b 10:07:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 731.019853][ T871] Unknown options in mask d87b 10:07:10 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200ff1000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0x4010ae68, &(0x7f0000000080)) 10:07:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200021000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 731.326161][ T885] Unknown options in mask d87b 10:07:10 executing program 4: 10:07:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 731.609899][ T897] XFS (loop3): Mounting V4 Filesystem [ 731.646178][ T902] Unknown options in mask d87b [ 731.687585][ T897] XFS (loop3): empty log check failed [ 731.701924][ T897] XFS (loop3): log mount/recovery failed: error -5 10:07:11 executing program 4: 10:07:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200031000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be0") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 731.780983][ T897] XFS (loop3): log mount failed 10:07:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:11 executing program 4: 10:07:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200041000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000011004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:11 executing program 4: 10:07:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200051000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:11 executing program 4: 10:07:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000088004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200061000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be0") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:12 executing program 4: [ 732.730169][ T949] XFS (loop3): Mounting V4 Filesystem [ 732.772340][ T949] XFS (loop3): empty log check failed [ 732.793861][ T949] XFS (loop3): log mount/recovery failed: error -5 [ 732.941285][ T949] XFS (loop3): log mount failed 10:07:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200071000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:12 executing program 4: 10:07:12 executing program 4: [ 733.200905][ C0] net_ratelimit: 18 callbacks suppressed [ 733.200914][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 733.212461][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200081000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:12 executing program 4: 10:07:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:12 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200002000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 733.593837][ T994] connlabel_mt_check: 4 callbacks suppressed [ 733.593847][ T994] Unknown options in mask d87b 10:07:13 executing program 4: 10:07:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200002f00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 733.746506][ T999] XFS (loop3): Mounting V4 Filesystem [ 733.827796][ T999] XFS (loop3): empty log check failed [ 733.840930][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 733.846752][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 733.848874][ T999] XFS (loop3): log mount/recovery failed: error -5 [ 733.852668][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 733.852718][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 733.931057][ T999] XFS (loop3): log mount failed 10:07:13 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(0x0, 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000fa00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:13 executing program 4: [ 734.080917][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 734.086778][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(0x0, 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 734.248816][ T1022] Unknown options in mask d87b 10:07:13 executing program 4: 10:07:13 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000ff00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(0x0, 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:13 executing program 4: [ 734.642583][ T1044] Unknown options in mask d87b [ 734.720931][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 734.720978][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 734.852620][ T1059] XFS (loop3): Mounting V4 Filesystem [ 734.903880][ T1059] XFS (loop3): empty log check failed [ 734.915611][ T1059] XFS (loop3): log mount/recovery failed: error -5 [ 734.981117][ T1059] XFS (loop3): log mount failed 10:07:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200002f00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:14 executing program 4: 10:07:14 executing program 4: 10:07:14 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000fa00000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 735.239714][ T1077] Unknown options in mask d87b 10:07:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs ', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:14 executing program 4: 10:07:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 735.627552][ T1096] Unknown options in mask d87b 10:07:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001ce44b0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:15 executing program 4: 10:07:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000884000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs&', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:15 executing program 4: 10:07:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001002000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 736.286012][ T1125] Unknown options in mask d87b 10:07:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000001100004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:15 executing program 4: 10:07:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:15 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001003000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 736.633390][ T1142] Unknown options in mask d87b [ 736.804916][ T1146] XFS (loop3): Mounting V4 Filesystem [ 736.854439][ T1146] XFS (loop3): empty log check failed [ 736.873301][ T1146] XFS (loop3): log mount/recovery failed: error -5 [ 736.931574][ T1146] XFS (loop3): log mount failed 10:07:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:16 executing program 4: 10:07:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001004000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:16 executing program 4: 10:07:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001005000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 737.214776][ T1168] Unknown options in mask d87b 10:07:16 executing program 4: 10:07:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000011004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:16 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001006000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 737.571039][ T1185] Unknown options in mask d87b 10:07:16 executing program 4: 10:07:17 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001007000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:17 executing program 4: 10:07:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x1c', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:17 executing program 4: [ 738.216092][ T1210] Unknown options in mask d87b 10:07:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001008000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 738.240920][ C0] net_ratelimit: 19 callbacks suppressed [ 738.240929][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.252568][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:17 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000030000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:17 executing program 4: [ 738.733653][ T1237] XFS (loop3): Mounting V4 Filesystem [ 738.778930][ T1237] XFS (loop3): empty log check failed [ 738.784671][ T1237] XFS (loop3): log mount/recovery failed: error -5 [ 738.811500][ T1237] XFS (loop3): log mount failed [ 738.880993][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.881036][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 738.886869][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:18 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x88100) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x3ffffc, 0x0) write$P9_RREADDIR(r2, &(0x7f00000000c0)={0x68, 0x29, 0x2, {0x7, [{{0x16, 0x4, 0x1}, 0x5, 0x8, 0x7, './file0'}, {{0x82, 0x4, 0x3}, 0x1000, 0x1, 0x7, './file0'}, {{0x0, 0x3}, 0x3ff, 0x5, 0x7, './file0'}]}}, 0x68) 10:07:18 executing program 4: 10:07:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000050000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:18 executing program 4: 10:07:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000060000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 739.252101][ T1257] connlabel_mt_check: 1 callbacks suppressed [ 739.252112][ T1257] Unknown options in mask d87b 10:07:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x1, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101000, 0x0) 10:07:18 executing program 4: 10:07:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 739.440899][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 739.446812][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:18 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000070000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:18 executing program 4: [ 739.770543][ T1285] XFS (loop3): Mounting V4 Filesystem [ 739.819672][ T1285] XFS (loop3): empty log check failed [ 739.855863][ T1285] XFS (loop3): log mount/recovery failed: error -5 [ 739.961413][ T1285] XFS (loop3): log mount failed 10:07:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001008100000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:19 executing program 4: 10:07:19 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000280)) setsockopt$rose(r0, 0x104, 0x7, &(0x7f00000000c0)=0x9, 0x4) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000480)={{&(0x7f0000000340)=""/251, 0xfb}, &(0x7f0000000440), 0x40}, 0x20) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000240)={0x20, "8deb7a42bdd479bbdedca0f9c8f15f3d8200a712950d0219ca71a49e87c35ef4"}) r1 = socket(0xa, 0x2, 0x0) r2 = request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='/\xf7\x00', 0x0) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000180)='asymmetric\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]}, 0x2e6) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0xb, 0x0, &(0x7f0000001040)) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000300)={0x45}, 0x1) setsockopt$inet6_int(r3, 0x29, 0x3e, &(0x7f0000000700)=0x5, 0x4) 10:07:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 740.080866][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 740.086749][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 740.092675][ C0] protocol 88fb is buggy, dev hsr_slave_0 10:07:19 executing program 4: 10:07:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010003f0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:19 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f00000031c0)='/dev/dmmidi#\x00', 0x100, 0x4000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000003200)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000003240)=0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000003280)={r1, @in6={{0xa, 0x4e21, 0x6, @loopback, 0x5}}, 0x9, 0x4}, &(0x7f0000003340)=0x90) socket(0x4, 0x7, 0x3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$dmmidi(&(0x7f0000003380)='/dev/dmmidi#\x00', 0x7f, 0x80000) ioctl(r2, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r3 = socket(0xa, 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000003100)={'nat\x00', 0x0, 0x4, 0x1000, [], 0x9, &(0x7f0000002040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000002100)=""/4096}, &(0x7f0000003180)=0x78) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000002000)=0x6) sendmmsg$nfc_llcp(r3, &(0x7f0000001f80)=[{&(0x7f0000000000)={0x27, 0x0, 0x2, 0x6, 0x7fffffff, 0xffff, "c6e92e8418af9b5b2d36ecc0c65c6be0d9e57930c9f374015b5fbbed5b28b69e207fbd773fdfdaeaf547ff9bf3124c573bc2a64874e3389916e23ab06472ea", 0x3f}, 0x60, &(0x7f0000000440)=[{&(0x7f00000000c0)="8313ebff2aebbcb22fc6de7f587c6321cdf4ebdbd4d7eb9336a99ee07e7103b636739dce89f2b8ff23ba37c4567d338d678f5007426c21ad8dedee7a1089225fc85e840d8fa99f682dcdfd6b8202f40e744ea31419f350b2712dc5291b", 0x5d}, {&(0x7f0000000140)="1f4073b8e086d243f049f4afc3e853f0d8800e08745814fb085906ced92fc0edb72abd5d09472353200f4d36d96c3e496b4008a13f97c8b2a9af82ad2ab9b50f9662e350d92aeed1d8e8acb175722640b02aead66dc3f5538fdf94834bedae1142d71c8732", 0x65}, {&(0x7f0000000240)="f98c7ee59bf780f905acc2131ad548bb932cf5118b3edaa6c6546a38ee3b3e57961262ce68ab1d76cd49669d870e7364bd87443061c705585ebcde2027f268ec8e71177f173f46af8e7a28dbe24a79a82c7184b2f9145b3fc2c7bcdc3b1159ec3b483face2983c745ad4fa612d7dc4343177bda8f2db3f86b5e750350582ca5a00755bee7cb6766139c7d8914b7ee9037f9d94b2f6a5bfc782159caffa700d90b7f618c0061b51acecd2d1d37668dd94d430ff55fe6532a10be25da2b828c7714979ee4edfd2ebed2e9dac4dcb1709cc746327b15a44d6f3fff9715648a6491aa88ae8416a676a96631bcc37ca0a7c6970", 0xf1}, {&(0x7f0000000340)="5d66dce1ae77ef718fcdd3ca2338e7ea29b7276b5a45aea9c687a83785ad46a1e6aeba36b8230cbcf387f3bcddef7fb1eedb12a72d0e19a1d3908d73061c6bdd836169287ff2d6", 0x47}, {&(0x7f00000003c0)="8e5eaa3814d5403212ac67b0c9a50a5677819b2acc45b504ff0c0bf95a02c15b7b429ba072e012b402b6677865dc5cf98898cb163334f3e2332f87a62c36", 0x3e}, {&(0x7f0000000700)="39186a11d48a2d8ca4f89fe90d4c25afb4a120fa3b36bb14fa7424c6037d083019ca5e1ded2e59c68dbb6df17087e603443956d796310ad187208aa05ac62e67014f0cf555d331f299305be99f0fdad6555e37f3ffd80131b44bb3ab3cf66a80369a71cfa9b44f524a42a20d8b499859bb476db3047bfacc8ad7d7d3acbd9d4e6cb364e4ec30b056b462bd7f64caa4c8dc232907c019e9a5df9618a2b7f0e9dac846d2e4200e25f82576c0c54c53bc3a9d6c5f9caa6aa3eba909105ff2cbc162655cb2cde050", 0xc6}, {&(0x7f0000000400)="5369c943b44d911d3d3fbb60c2ef4355838337fbeecb47700d", 0x19}], 0x7, &(0x7f0000000800)={0x20, 0x13f, 0x6, "6e91b2fe1eed5bc80ad2b053179a"}, 0x20, 0x50}, {&(0x7f0000000840)={0x27, 0x1, 0x2, 0x2, 0x0, 0x5, "9f127a7c6aa2749d00a94ef6b05c8a4e1116028999895478492c81e0d23e8d7803b92e6d7f2b5c1bebced88b6399780cb4e73112b8a7818190ee22d934d7ca", 0x3a}, 0x60, &(0x7f0000001ec0)=[{&(0x7f00000008c0)="bae06e00d32f23c54f7316d560de5208fb572811b1602eba1fcda7b95ca8ab49159a31229cb2bae35162516197bf5f388c921511551278e69305d6d37c42656ecff9b64e2c6e843f65e418f71ee8170df29dd6e32755a10611d5394fc4d54729fd482bd29a85fa2a472d8b509043db58108817b5562429e417e95a9e9a312dfe829603cc1e54bbf616f66cb528c58b00fdcbc6f4fdee42a0da319488d7237384e4a50e573b170b67fd4939d8f34fdf9bf2d3f4e3bcd531dca5ad3ced9a297bca667636ad68f2fe55167989769ccfa0c105c9384cfdfd2e23cb04400101b954a6250a799e55c0adf69c629d06d288510ea29ec47c048a", 0xf6}, {&(0x7f00000009c0)="bdb6b0476a8edd14d18ed6f7c5f55c2bca4ad89042", 0x15}, {&(0x7f0000000a00)="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", 0xfe}, {&(0x7f0000000b00)="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", 0x1000}, {&(0x7f0000001b00)="848012ec15205058b60a88dfda76496513f14b81250e954d8e9d61841dcaf1c24a61906175e32ab0055c62", 0x2b}, {&(0x7f0000001b40)="d01ed244a25a68ada931817e3940e982d7069f17997e711a424a255dbf217d387b3ee4db6aec85e1883878c9f76a51372ca6431025f8238ac12b6981e52ed6ef2256983982395c6c3beb7d4a163a23a7ed45969243a046dc8a98f07015d2a00d43b0bf3dc8487478db34c893b5a33898961e5d9e070e27e94e910d335af1f367b88fbccbd519e8773a8fa40b9fe994d1ed6182c592faedf34cf24a91b3de51a159d2b34f3d234d911348790beabc65609b0d65a2a9d4433e6deffe8b90fd05f1d30c4b726f3136a756b7177ea4224458e23627eb26f3", 0xd6}, {&(0x7f0000001c40)="22fa36df8e4f96ae167eefb8867d9095b5753eac8e104cf8e631d74114a47bbfd9776588d9889baf2e177a9a4c4d4982f58e5f3f85f48cb820e0677c3cba147c0c70821b7fa8e972ce4809326f1d9d05a55058d146022fea525ac190e8648e31b79d9e3b8aa079cee490784220d876166742", 0x72}, {&(0x7f0000001cc0)="11b668a4292d0cd0c7d32d5db732d80799508c63cd8f645e957e88e5b54a2910b3ba72080368cca36c8094d76c4bb0cb55bf291f4b4c28d5f8413cf7aaea5b361bfbea2175db480987c523e937e98bb824a2a53258376359bb1da68d270060610b8ed45a32753fb11d66e53186b9b881df3cae00901ff1b3f58a6fff52b4dc86c59606a3f439ef439a425360491c8f72b286c58eda91730ed648eb67e267aaf56fd2ce60f039276abd14b016bd32999fe23d48397073c73cfc977560190dd37026886449e7ebfbbcacd9a2a3f95704a126e2c204c603", 0xd6}, {&(0x7f0000001dc0)="472cc70240df5ee8eb14f64f5af6478f6ef5bcb0d837acbc4b94fd43a643b5f7f9dcbf54fe225954913c194621dab70402271bc3a4f6faace2d53be9cc87747d7005aedcf073c18971572b7b670ed678d7c8ad42756ca7482ef857e36e545285f4b90da063b5010282656d3070444b5fba6ca5798f1931253e52835bf815a576c2b0a0334e23af6011e83cc59cd7aa3646b597fd3cd3006e4e3e9397fbbdb42af89aaec43b5cf11a755b0b9e982e189c431c7d33ada6d0ed7e26c36fca52d8bad4d2f86be9052343a0e748546d8c6001223a35f99645fb96c8a582b02e5c74fcd05c2a", 0xe3}], 0x9}], 0x2, 0x20000004) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000400000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:19 executing program 4: 10:07:19 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001008800000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 740.661160][ T1328] Unknown options in mask d87b 10:07:19 executing program 4: 10:07:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x401000000001, 0x0) close(r2) socket$netlink(0x10, 0x3, 0xa) r3 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) ftruncate(r1, 0x4820f) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r4 = socket(0xa, 0x2, 0x0) r5 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x200, 0x40) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r5, 0xc008551b, &(0x7f00000000c0)={0xfffffffffffffff9, 0x24, [0x36, 0x10000, 0x800, 0x5, 0x7fff, 0x3, 0x5, 0x0, 0x7]}) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r4, 0x10e, 0x8, &(0x7f0000000000)=0x9, 0x4) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000100)=r5, 0x4) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x24000, 0x0) [ 740.874209][ T1337] XFS (loop3): Mounting V4 Filesystem [ 740.929723][ T1337] XFS (loop3): empty log check failed [ 740.951671][ T1337] XFS (loop3): log mount/recovery failed: error -5 10:07:20 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000ff0000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:20 executing program 4: 10:07:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 741.134736][ T1355] Unknown options in mask d87b [ 741.151159][ T1337] XFS (loop3): log mount failed 10:07:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000001000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:20 executing program 4: 10:07:20 executing program 4: [ 741.515290][ T1351] syz-executor.0 (1351) used greatest stack depth: 22024 bytes left 10:07:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:20 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000002000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:21 executing program 4: 10:07:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000003000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/535]}, 0x28f) 10:07:21 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 742.126098][ T1386] XFS (loop3): Mounting V4 Filesystem 10:07:21 executing program 4: 10:07:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x2f9) [ 742.204970][ T1386] XFS (loop3): empty log check failed [ 742.255342][ T1386] XFS (loop3): log mount/recovery failed: error -5 10:07:21 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000004000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 742.360974][ T1386] XFS (loop3): log mount failed 10:07:21 executing program 4: 10:07:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x2, 0x6, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x01', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000005000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:22 executing program 4: 10:07:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0xffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]}, 0x377) 10:07:22 executing program 4: 10:07:22 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000006000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x57623845, &(0x7f00000000c0)="a7ebdc59177b103685e0705092c666069c3e9ff887a4285042a59f9f1a11da242dd9297f3d9800a35e5170c69636b25bceaa45acbd998bbd3e268be042cdc73b3f179652f4b7981435ba7f6e33fca0b2995cf3dbaebdcf7d97d2ff3f696638c4430ee7fa20e6087b2656c7a571ca85a0") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:22 executing program 4: 10:07:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:22 executing program 4: 10:07:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000007000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 743.475040][ T1459] Unknown options in mask d87b 10:07:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000040)=0x6) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 743.600911][ C0] net_ratelimit: 19 callbacks suppressed [ 743.600921][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 743.612712][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:22 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000008000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:23 executing program 4: [ 743.826354][ T1475] Unknown options in mask d87b 10:07:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000001008000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:23 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000000c0)={0x4, 0x0, 0x6, 0x0, 0x0, [{r0, 0x0, 0x4}, {r1}, {r1, 0x0, 0x5}, {r1, 0x0, 0x4}, {r1, 0x0, 0x4}, {r2, 0x0, 0x80000000}]}) write$P9_RSYMLINK(r2, &(0x7f0000000040)={0x14, 0x11, 0x1, {0x2, 0x0, 0x6}}, 0x14) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:23 executing program 4: 10:07:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000008008000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140), 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 744.240861][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 744.246726][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 744.252656][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 744.258443][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:23 executing program 4: 10:07:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000003f000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 744.480862][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 744.487234][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 744.504209][ T1500] Unknown options in mask d87b [ 744.577909][ T1516] Unknown options in mask d87b 10:07:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x12b, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB="36e5d701f6a066646220b980f63ef08d27671167e689d443a2a6313beda07c6b4d320fd2f57f5164df3cb681b06dd5b6b6223c09a6caea54901a4a6977ea0a09232bfe5d8168dbeae74dec4b478eca1a2309dd63dc25758fa04ea9d02dbb7e2a90993457292804793c93dddbb87ef6f6c0ab32d796127089a494cd1962e860b062765135fb406442ff43b8f4335c4264ecacc9bface196b744d7a9418b5bf15ee3cf449da447ccdbcde232c1a5e5a84ac8afd9fb43645ff4584278d1353ac8859ba81a2c464b7ad5d3dfc4576b71c90d0dff3e40a50bc39fd0d60068caf2067cada3", @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR64=&(0x7f0000001780)=ANY=[@ANYRES32=r1, @ANYRES32=r0, @ANYPTR64], @ANYRES16=r0, @ANYRESHEX, @ANYRES16=r0, @ANYRESHEX=r0]}, 0x1a3) 10:07:23 executing program 4: 10:07:23 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000040000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 744.889437][ T1524] XFS (loop3): Mounting V4 Filesystem [ 744.959646][ T1524] XFS (loop3): empty log check failed [ 744.989068][ T1524] XFS (loop3): log mount/recovery failed: error -5 [ 745.071231][ T1524] XFS (loop3): log mount failed [ 745.120865][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 745.120894][ C1] protocol 88fb is buggy, dev hsr_slave_0 10:07:24 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010fffffff6000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:24 executing program 4: 10:07:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") listen(r0, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x500022}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffff8b}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004001}, 0x4000000) r3 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x353) 10:07:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:24 executing program 4: 10:07:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:24 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010fffffdfc000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xd, 0x5, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000700)=@filter={'filter\x00', 0xe, 0x4, 0x3d8, 0x0, 0xc0, 0x180, 0xc0, 0x180, 0x340, 0x340, 0x340, 0x340, 0x340, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@ip={@remote, @local, 0xffffffff, 0xff000000, 'veth1_to_team\x00', 'bridge_slave_0\x00', {}, {}, 0x37, 0x3, 0x58}, 0x0, 0x98, 0xc0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xc0}}, {{@uncond, 0x0, 0x160, 0x1c0, 0x0, {}, [@common=@unspec=@physdev={0x98, 'physdev\x00', 0x0, {'ip_vti0\x00', {0xff}, 'ip6gre0\x00'}}, @common=@ah={0x30, 'ah\x00', 0x0, {0xfffffffffffffffa, 0x3, 0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@empty, [0xffffffff, 0xffffffff, 0xffffffff], 0x4e22, 0x4e24, 0x4e24, 0x4e24, 0x7, 0x5b, 0xbb, 0x7fffffff, 0xfffffffffffffffc}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x438) ioctl$VT_RELDISP(r1, 0x5605) tee(r0, r1, 0x1f, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x400, 0x80002) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x106, 0x9}}, 0x20) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80040202}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r3, 0x300, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x4008810) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000c40)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000d40)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000d80)={@local, @mcast2, @mcast1, 0xd7, 0xf94, 0x55e, 0x500, 0x100000000, 0x100100, r4}) 10:07:24 executing program 4: 10:07:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010fffffffe000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) write$binfmt_script(r2, &(0x7f0000000700)=ANY=[@ANYBLOB="2321202e2f66696c6530202f6465762f726164696f2300202e202f6465762f726164696f23002062726f757465000ace4e2775c9ba7ff10a53018f26acc2a4a52267577c6851c8e6da79e71c0817d7d12f1312535cfdaca1ff957468079a592bc7016bf129de9ed1f646cd48168e2463c5f858c6ecb9e90dd80b8049e3fe893c1d710f5d27d4973cbd0f37e79e71838fcadd6c49574f56ef6db2f8f80cdf9de529614b61bde9acc9f41e79a4220453da4f68197cc39a03f43e558a691d209f9f0266929e493d5d03ca12c167e60511a67920621ad3f83de49ec8f621ecdda02933287b6c6cb4e771978157ba9c6d26fa2040cd79f6b52019598e0275476faf7e9e43713a451d0bf39a4fb1dfed8a8d90f475c09594345b9df569965e8762adabccfdded2b3134798bab593f9aa5b5b44e855ae6c8932ff4ab5a2bbe0c85e3f5d6206b5603a074186a21f3304958a8f30a3ecf393fe5e3851ea77c2221b708276053c42fa0192b3e859903288186d565ed1663dfeacab0380fd058c93159c92d5ec66c666896582a707e7603e2115fe604970333baa23cbaf6922ca15853ba5d3fcfb2e672fd89131271caeab8bcbfb282647bc38610d53f26df2bdc26abfcde091233ab533785360cf8281bdcfbc0ab4ae5155b3b51cce44aaeabf7e33f7778be1bcc010cf27a45b0bcd18116f5de659406a43dbab7b7b904f59c63cd8a191b357a253f90affc258031dd517b6d596d5c41e9f08c5cdc49d49647b89b032c3e3d4dd11601b93cbddf030b3ba15918a461227c9144c9922cd5e600f4b29f6e62fa02e5748dae0a09fbf71425282eb0ecee8dcdd0fc97986938ff26651654ce6a199756619a68ae321a9eeacc9ea94001b21cf31dd6d7ff78e58461d182fc5c692355051e26f9cc7eaa4e3eb99c8f76be1fc612f81e57b6fd6a9970d0d00c5bb21c7a0ec9b8c730aa628503ed32d5c0cd4e70f4e8a64db7a91c79b85b645e4f7c32a9239e616ffdf4a383a3bd4518e2292d8eae9276f1c852b6c4fcb64bc58f92826bdae7c874c588b53e2d15defb78641684d06175f2617110d04c525f10c4210bb8bcb01c458446faec9fee8402c7ce11b711e16930ef300ad8d86f2375675983c56bde84623d18fb00acc628ec1d83d0336f8e45958776aa5e6519f97b5bbbe6e8d9336c9330ab94fb51bacb84ff0076f6da74efefbfafa2dc2e789c1316aad125a17232cd56c20e241d154dcf2ddda175a0afb4e0227d88b404d342c9840cc18ffa2e5f0b417b244eb3fc7748b0aaee8e4bdda146ee67c8c60c4b4f80855cde8b2c26989270112f5dc9ba39790f65e0dbb34ebf9c5c4f51dea735a43afd3121029094f1d18c4d321f9249d239c43c82a6790e6911a7fdc50c5ce5070e4640ef99f50738cf1c48d12cd8eec7abab9429859f858a053fbc2ae1df75799958b833c96b435f0f1573f2ebcaf51f1ec35695877c32d0e184bb1626c8c68a70d0d0d045626518ee76fc3822e4b55af420b23e99209720415677c796f890059054cbaf9c446c80cfeb48337bef8c0fd7e0ffb28b2693fb144c4591315f1f34d4a0248a9c366b24dc053fd1702d99e5f57072eccb163ddf1f173b5855eca81869fd5b1b729ba268e1ae017083efa62c5b6de52f3e213ef7e12827513533769bd5abbaadc402d98bbb40da5eecfb346a006d63eaac5c18ce30fbb91055c2e00f07d328fd374d4db75dce66ee4cab45def43caf4e2420677cf15a61c193e115463ea2e79197b49ff82580424c03c5e9648dcc66170282036eefcc76d2420da8fb235db81e385f585ccabfa2413edf125b3a66972938b2119106a821edbb372f535e8b05ffb915eda2ced6284ec9d40def7caa0e6f7ee7d956e1412db124e9307aea86b31e0980f91be5da1bb5e4bcd79b7e046b50700dba6ee230fc187fde4e9cd408ecb86f4b32d97f6b4732211fe3120ca2b1eb9c8d9fac041c0018a9ef511f4d4f04485899aa900c38023c052c159435fdcd9e7b00d147e058486fe5ade921880744ce08619dd2288ccd12b2efff0b8ae622b17848e2b94b5ae3a68d55974780ab3e998c2e9ee614f309dd2d6b10af3cd5849e9de6f23dd9db572ae31fee0f62f10e3f38427f72ce6c7ea07590685df6d98175dd7565e6e68d5918584f0569e9daaae133392a95ef00ebd4abfc4721fa894e93c1871ee4a90a0180f864734d486b87a9c9dda3f31d43da318ff50969179b1dac78b77eff5accab349baeeb1c25bd999854862098633a125a8a13b0dc267eb048bd9f1b0e5ba204fd956a3660e4264834cbc36cc9746623e7e374ed5d603a9e6434a21c145e2a816dfaf79a63f2dd83074df1968e130044330d6f3a45400f7dad68ffc9fbf683ffa934a521a5e9019d69d2e781a123288bc44f71bdc10287c9dfe49c6ca22e6e2dfe71c224d3abaf70bee7e37dcece8b3c63d4173b9cc8038809bfb9fdadfd405b5fc9d5838aac97f0f72a404fe3dbdb5beb1a894c496d48203c50773a509ae5cda3e3fc2c4e09b1875578a6f11137b0ec36138cb915d75dc5473d5c075b81981131979c0b5ef5138685d11f3e6cb31ff84e2c3e436789f7b9abca314a954d8f157e22953b380c0f2cb55118bfa48f9d18aefa750368d88bd4ac2a57e51054da1c6458330ed439ee8cf89805fbd5be0df333dca7b560c78b5f80e6ed6473719653df2f12c84bd8762a578a1244dafa86794b41f8d7070e014d01ff175887cf40b1791c4dda24dbf32d872e621bafd60249d4660c30afba54621d779d4673d22f410b928e1e91c9ef30291b2765dc1d75a04f0e64e421866d9b0d3c879f81dade93e643253688dbcc4be0936a5a09d60f8c608bdf69c9887a266c080b98303c243b418903aad450b21628adee5962dd68087093d2f7a7243c730fae5b604c7c1b67699baad439b115e74175dc422c5e8b754eacb83b382479b2246cd34d08481a3aeb6e1a4da6588826e1ee49a40901bc2f8b0e9af322119d750a2ab6ff9621d8b570fdffeefd43736d17d544fdd41140aec850af55096d88725e7fb6faa4efcf8eeb984ff4fddc5f25195e9ad071c75bd7d3d4287bdfd6f612a31ef9019fa795bb04ea2d04fcc497a991881fafbbb1e19b4b8ccd2a00a39c3bdb2639606751db0fdf3e9c7d24d5f2892dd0d456bada060734708fdb8ecc585374cb274bc4069ee39b46a8c8e70f0974d90ed305a2822f01a1458d7a76885969b4d05d56409dd5a8b105bd8552cb15d4094389acbb68c7e88ab346c4bd5c1a820ab50a9077d0fb567a42b8b6a35694eb6ae31c1a2ec7b88f4b80d7379c3d491fa70b637a4f7ca9eb3f243042d7c02570ec74bcc728e393f54574ba53aaee78c48769289a4efecf6003772ad90ce398e2eda12bd827570e0ec8fda715c64b08caaa63eca07f6c328246545bfe5a2cf40e536dae13bdc4d81dbb29eba77ef585faff5aa9201e00dcc9fa790f6087df03ab73cbce9d813cc044a589fd85ed889943c3f96d200495ce45e38e9ba153ef3084d3d1221f2e75451edc86e40d44a02573601b4547d8412de5364738cbb3f4f6bfdd871002364a7fea25941dbfd6e85c0b63e0576ad4e343982def2fb24679b5e09816ec0d3c52d7aa0ebd465d3fa72d335b9699fd8edab9d37b18c1d88eac9c439d222ae6bded714a64df36ea3d00e1a227e272adf4fd6b9ec260b75013588929b301557d504ef90a770e8df9cb41e68188e80cfd034d2ee58e491f8ea46cf4a16265b28b77a6f74ff3e67ed1fd396698914911685442be779a73c1e0c6dc325a3076a608ff0ad1813efe8f9422d3df187b36aab66bc80fc38bd5678200072c77e938fea231da3057c8857c318215440dc63acb54cf69e23132a578ead950e5b12908f73141453486a682d3950edc518ef48adbd6fefe4430a71c7be1d993d54ed1faebb70f2428f1b96eb30892aa17a9ced698bfb9cc0574d442a91a847e91fd837390131cb68e8f24fb092055d2a58116d187535f0752a6e8ab3a7b3332305b142ffd44d784e1ee440af440a4e6f0011eb46deefd4cd11c910da81de93675cab10af8252013ff0cd45fdb3de87cc24e0a0057a60b25e7aa102493e0c4e125efd50294b855cb25b998d51ddceaceef0f667d063a5c730d7182bcad12389224c18bbd6330300cc1f9f871ab6e1e0ffbd955a3f0f58598f610a56f3167544844bb9d37fdc39a0fcd55383629127088cba3e101d34da0f13a43def36e79152b0831bef212f2abdd68bb3ee9bb3f35e22b901505a976ad73c78adb02812db202eab4ec92ae899bd71bbf5a82c3eae76f8ec4997b2b09c7dbee237ab8cf4ae796559b658d7429ec7a00bb0ec1d886932db255e6f0a394a8eb0c620dc09c6d0f8657796238e0b5c8a4263f3ddca87f2b68a5a0665977c596057a18258cc6b8459b96dd982ec694396d36f6a0aecd7f063541e9ab1875cd1863bc2cfc040221b79e6d6a64f61d93f8d2dff6676681c387e21471866f0013930f9ea0c26aad9c7987028c218153b427cdcd6250b996da231a345ca40e5b582d9b9b946abfd1ceb6a739aedabb1151347ea37d2f3368fcb94ac9cda39a24f110b8e55b9e57c4dd7f753a3e19a38d5af4a8413e2a5dc55bb27bc3a97ac06a67356a45032f00da821b683c5c16cb1ea8718f04f6796a96a3f1912b65fb97590a419b9a9784c214d3f203e7780d982d6cd3f833b6b8e6ea51603b942bc620e24383debb435077bca1e788dedb6ede31e4d9ed71a2f4e155ab4961155c043e1fefa3ccd4cd5ba9ce8202f0a7879b521076e9cf073376e89569626d3565b420de70604ee20b3959b941ed9822c55d4b2b928396f2e118053468045d2f743bec497c9b5b89b89191d1b4f5c83d28a173b3e7a884fde2abc6bb4273799811408f704100f8da6e7ff8d78010a8e4e567ac338b6c2ca87ff445fdba3b88e533bf32511c772c18c391b3142dedef3aaed038428acc36628e20bc24af9c6e7490ab1fede9ddf219c3eac7600dede74d4f56ddf09a7407644d74da6ef8820741920007b09441779faa65bad1faec464cb89de96ae30a1ef0c2ddbdd4856cbdb7c879e0e5ce5e1e3c12aa17500f7c686d531de9138e10ec89ea3d1ba6f2840318e3e11844df68a1685ca5861f17ae2425f1fea2b7abb6bf7c3f502f94a5e191c540f2c66bd852d7e271ec46237cffb7f89ae3284acaea70f9e0dd11d05c6faffe19c600dfd47d800900a1a46233ee5bd681bd2c921210b18ab7954a00fd1dab68a382194959ed229d136f728ef0ee1a4720400723b9be37ff8b0d3d77ddc552828ffddd695bef18599483f677a558a8f34a29ccc649ff5712702a1376ac1ff260c11de05be59a6ae734e8de489e26aeea96120ec405b7ab647a8d71a193182243e15da2262e361fabdefd4699259fcbb61c4d1158f502f4e4beedceb79b35b613f042b2ea7babff6a9f2a929b53fa96fbc17c073bda76af4c66607f63128b3001d813784058f865ffb8eb079dc25ac05f2fbeffb0c66e6d97e1c74c2a10a8c99a118947bd0947515700f174f386b9d909d2e920234fc0968e9b58d6a783a893d3cecbd57bcea995b45a6889c3b7d53e7b5cf807e5b9b1ff330de2075fbba503b7eabfcd0c45dee58ed66153cc13edb53303f592903318e456140c04dbe15e137ffb412e7783f8a03338d4c68f6575f827efdb296ffcf2e1f961a9b85e7c02882d3f36733961a5891fb4120bc87c645d2b0244d1c8046a885d830b9420cc07ceb02b25925fd50e9209d4735501b23bfd17bb9d812d925ade9f9014eb00d4ae850f654eae3dd0112bb88661f1fc958a7054f438953da6b21e7d9b4b4f4237b26f279"], 0x102f) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f00000000c0)=""/170) [ 746.097883][ T1581] Unknown options in mask d87b [ 746.114060][ T1584] Unknown options in mask d87b 10:07:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x01', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:25 executing program 4: 10:07:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000ff000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:25 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x4, 0x4, 0xfffffffffffffffe) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x3a1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000100)={0x1, 0x101, 0x9}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000240)={0x6, 0xfffffffffffffdfe, 0xfa00, {{0x100000000, 0xfffffffffffffffd, "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", 0x29, 0xfffffffffffffff7, 0x401, 0x7, 0x4, 0x5, 0x7}, r3}}, 0x138) 10:07:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:25 executing program 4: 10:07:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010fcfdffff000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010f6ffffff000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x2}, 0x4) 10:07:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:25 executing program 4: 10:07:25 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010feffffff000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:26 executing program 4: [ 746.844941][ T1624] Unknown options in mask d87b [ 746.904445][ T1628] Unknown options in mask d87b 10:07:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000004be41c0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:26 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:26 executing program 4: 10:07:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x2e9) 10:07:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000200000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:26 executing program 4: 10:07:26 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000000000002f0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x2e8) 10:07:26 executing program 4: 10:07:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x01', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x101, 0x8000000, 0x5, 0x9, 0x8, 0x3, 0x266337979ffa62ba, 0x8, 0x11c, 0x40, 0x31c, 0x3, 0x81, 0x38, 0x1, 0xc0a, 0x6, 0xffffffffffffff01}, [{0x6, 0xee0b, 0x4, 0x80, 0xff, 0xbb, 0x1d, 0xc2}, {0x5, 0xfffc, 0x6, 0x708b, 0x5, 0x3f, 0x7fff, 0x80000001}], "2256216e2979fb87cad7a32edaf438b4c568fd6089a6d23c27f75521aa0b4d02297bcea6650f8ab59722974cb4694a39ed7f8e0204674b360484dad6ae888113647536fd5cb46ff695f2b28082e7af82006e7bd399e72f10cc48e593c61ab362731e0d63bceedd404220d6a47d6dba9536bc30587d5b886a1165cc0104559ecc150d757e46775686bb84a638214db2c9e6b21a05abcac362c12bddff", [[]]}, 0x24c) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 747.931488][ T1678] Unknown options in mask d87b [ 747.992415][ T1681] Unknown options in mask d87b 10:07:27 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000fa0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:27 executing program 4: 10:07:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:27 executing program 4: 10:07:27 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000ff0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 748.517085][ T1694] Unknown options in mask d87b 10:07:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x3, 0x8e) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") [ 748.640898][ C0] net_ratelimit: 20 callbacks suppressed [ 748.640908][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 748.652526][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000020000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 748.775597][ T1714] Unknown options in mask d87b 10:07:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:28 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61c", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100000890f, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x10080) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, &(0x7f00000000c0)={0x8, 0xab, 0x7f}) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x1, 0x0, 0x3, {0xa, 0x4e24, 0x3, @loopback, 0x6}}}, 0x32) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000700000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c636e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d0000000000100108255674aef1900766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000070000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aa2854f37b0946f276e5aaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516507000000000000007900"/560]}, 0x2a8) 10:07:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000030000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 749.280850][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 749.286747][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 749.290881][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 749.298305][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:07:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000001ec0)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000001e00)=ANY=[]}, 0x78) 10:07:28 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000040000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000050000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(r0, 0x409, 0x2) pwrite64(r0, &(0x7f0000000040), 0x0, 0x0) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x2bf) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x183400, 0x0) [ 749.840953][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 749.846841][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0c6fbc45ff810500000000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd000000100001000c080800418e00000004fcff", 0x58}], 0x1) 10:07:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x01', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) 10:07:29 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61c", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000060000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8040) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:29 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000070000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 750.480927][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 750.486803][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:29 executing program 4: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) poll(&(0x7f0000000000), 0x2000000000000034, 0x8000000004e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xffffffdd, 0x0, 0x0, 0x800e00a35) ppoll(&(0x7f0000000000)=[{}, {r0, 0x1}, {r0}], 0x3, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 10:07:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000080000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 750.735420][ T1803] Unknown options in mask d87b [ 750.844601][ T1803] Unknown options in mask d87b 10:07:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000240)={0x0, r2}) r3 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f00000000c0)={0xc0002009}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a00000004f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/559]}, 0x2a7) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) sendto$rxrpc(r1, &(0x7f0000000000)="96368d22d8a57b9e7ac8c4119acd858e1a9628986b7e8812b24a13d0c65c78616cc7cc36bb071e3aeca5aed69e095cad9a6db420414a581943", 0x39, 0x40080d0, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) io_uring_setup(0x1fa, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x198}) 10:07:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000300000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 10:07:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000500000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:30 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61c", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:30 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x01', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x2000000) 10:07:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000600000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)=""/41, 0x29}, {0x0}, {0x0, 0x240}], 0x3, 0x0, 0x5d}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000140)=""/192, 0xc0}, {0x0}, {0x0, 0x235}, {0x0, 0x7a}], 0x4}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) readv(r1, &(0x7f0000000840)=[{&(0x7f0000001c80)=""/251, 0xfb}, {0x0}], 0x2) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 751.497022][ T1841] Unknown options in mask d87b [ 751.521731][ T1847] Unknown options in mask d87b 10:07:30 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000040)=0x78) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r3 = fcntl$dupfd(r2, 0xfdeb192c0c9d8c47, r1) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) 10:07:30 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000700000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000081000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 751.820324][ T1865] Unknown options in mask d87b [ 751.882996][ T1868] Unknown options in mask d87b 10:07:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000700)=ANY=[@ANYPTR64=&(0x7f0000000180)=ANY=[@ANYPTR], @ANYRES32=r1, @ANYRESDEC=r0, @ANYBLOB="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", @ANYRESDEC, @ANYRESHEX, @ANYRESOCT=r0]]}, 0x80) 10:07:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 752.318015][ T1887] XFS (loop4): Mounting V4 Filesystem [ 752.349702][ T1887] XFS (loop4): empty log check failed 10:07:31 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000003f00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200000, 0x20) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000002c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800204}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x0, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40) ioctl$UI_GET_SYSNAME(r3, 0x8040552c, &(0x7f0000000040)) mq_timedsend(r3, &(0x7f0000000700)="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", 0x1000, 0xf965, &(0x7f00000000c0)={0x0, 0x1c9c380}) ioctl(r1, 0x11000008912, &(0x7f0000000100)="c0dca5055e4bcfec7be870") r4 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000240)=@nat={'nat\x00', 0x19, 0x3, 0x54a, [0x20001700, 0x0, 0x0, 0x20001846, 0x20001bea], 0x0, &(0x7f0000000140), &(0x7f0000001700)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{0x9, 0x8, 0xdbda, '\x00', 'dummy0\x00', 'bpq0\x00', 'vlan0\x00', @broadcast, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @broadcast, [0xff, 0xff, 0xff, 0xff, 0xff], 0xce, 0xce, 0x116, [@arp={'arp\x00', 0x38, {{0x334, 0x829b, 0x0, @local, 0xffffffff, @remote, 0xffffff00, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @broadcast, [0x0, 0xff, 0xff, 0xff], 0xa, 0x6}}}], [], @common=@ERROR={'ERROR\x00', 0x20, {"2aed22415ed2893a2a73b8f728bc0c0ed903fc1f6f73437ecb42cf6eb3c2"}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{0xb, 0x20, 0x15, 'bond_slave_0\x00', 'veth0\x00', 'team0\x00', 'bond0\x00', @local, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], @remote, [0xff, 0xff, 0xff], 0xde, 0xde, 0x116, [@connlabel={'connlabel\x00', 0x8, {{0x4, 0x2}}}, @time={'time\x00', 0x18, {{0x10000, 0x4, 0x4f72, 0x11acf, 0x0, 0x0, 0x2}}}], [], @snat={'snat\x00', 0x10, {{@random="1aced27bb609", 0xffffffffffffffff}}}}, {0x15, 0x40, 0x809b, 'veth0\x00', 'bcsf0\x00', 'gre0\x00', 'netdevsim0\x00', @local, [0x0, 0xff, 0xff, 0x0, 0xff], @random="d1c08401b7f8", [0xff, 0xff, 0xff, 0x0, 0xff], 0xbe, 0x12e, 0x25e, [@ipvs={'ipvs\x00', 0x28, {{@ipv6=@mcast1, [0xffffff00, 0xffffffff, 0xff0000ff], 0x4e22, 0x33, 0x6, 0x4e24, 0x8, 0x11}}}], [@snat={'snat\x00', 0x10, {{@dev={[], 0xb}, 0xffffffffffffffff}}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:memory_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0x5c2) 10:07:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 752.380250][ T1887] XFS (loop4): log mount/recovery failed: error -5 [ 752.531573][ T1887] XFS (loop4): log mount failed 10:07:31 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000004000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 752.580404][ T1901] Unknown options in mask d87b 10:07:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x0, 0x0, 0x9) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000000)) 10:07:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000088000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000ff00000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r2, @in={{0x2, 0x4e22, @broadcast}}, 0x200, 0x3cb, 0x5, 0x0, 0x1000000}, &(0x7f0000000240)=0x98) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r3 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 753.247619][ T1940] Unknown options in mask d87b [ 753.359338][ T1947] Unknown options in mask d87b [ 753.368079][ T1942] XFS (loop4): Mounting V4 Filesystem 10:07:32 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000010000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 753.438296][ T1942] XFS (loop4): empty log check failed 10:07:32 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x81, 0x40) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000000c0)=""/143) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) ioctl(r1, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x2dc) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm_plock\x00', 0x80100ffd, 0x0) getsockname$llc(r3, &(0x7f00000004c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000500)=0x10) [ 753.480972][ T1942] XFS (loop4): log mount/recovery failed: error -5 [ 753.621436][ T1942] XFS (loop4): log mount failed 10:07:32 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000020000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) socket(0xa, 0x80003, 0x8) 10:07:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x01', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000030000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 753.964180][ T1978] Unknown options in mask d87b [ 754.000907][ C0] net_ratelimit: 18 callbacks suppressed [ 754.000917][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.012523][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0xb, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x2, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x0, 0x600], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2}}}}}}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000040000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:33 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:33 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000050000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 754.486707][ T1998] XFS (loop4): Mounting V4 Filesystem [ 754.570539][ T1998] XFS (loop4): empty log check failed [ 754.596342][ T1998] XFS (loop4): log mount/recovery failed: error -5 [ 754.640978][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.646900][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 754.652865][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.658668][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) r2 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) [ 754.721197][ T1998] XFS (loop4): log mount failed 10:07:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000060000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 754.880934][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 754.886848][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000070000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x3) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x80, 0xc0000) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000180)=[r0, r0, r0], 0x3) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"/606]}, 0x2d6) 10:07:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000642df7c6eda8bbee06bbb4e68c479a08ce62f32bf439a60000000000006c000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa0000008279000000000000000000000000000008"]}, 0x2a8) r2 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) 10:07:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000080000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 755.520938][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 755.520982][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:07:34 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000280)={r3, 0x3, &(0x7f0000000100)=[0x1f03, 0x8000, 0x2], &(0x7f0000000140)=[0x101, 0x7, 0x8, 0x0], 0x1, 0x9, 0x7dbf, &(0x7f0000000180)=[0x100000000, 0x4, 0x5, 0x7, 0x8, 0x8, 0x2, 0x1, 0xa53], &(0x7f0000000240)=[0x6, 0x7e, 0x9, 0x100000000, 0x4, 0x2]}) setsockopt$inet_tcp_buf(r2, 0x6, 0x0, &(0x7f00000002c0)="99cc4ff8e430312a4c39db15e48f34456702c1600ff07c6e0102b91cbe7dd7741078f84fa8c815239940e60253412e776418939bb932f5a96d8dad840da8da", 0x3f) 10:07:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @link_local={0xb, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0x86ddffff, @remote={0xfe, 0x80, [0x2, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x0, 0x600], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2}}}}}}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:34 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000010080000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 755.770063][ T2054] XFS (loop3): Mounting V4 Filesystem [ 755.803121][ T2062] connlabel_mt_check: 2 callbacks suppressed [ 755.803130][ T2062] Unknown options in mask d87b 10:07:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000080080000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 755.845667][ T2070] Unknown options in mask d87b [ 755.848114][ T2054] XFS (loop3): empty log check failed [ 755.885008][ T2054] XFS (loop3): log mount/recovery failed: error -5 10:07:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgrp(0x0) ptrace$getenv(0x4201, r1, 0x6, &(0x7f00000000c0)) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$NBD_DISCONNECT(r2, 0xab08) r3 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0x80000) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f0000000140)=""/104) [ 756.013884][ T2068] Unknown options in mask d87b [ 756.019039][ T2054] XFS (loop3): log mount failed 10:07:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000003f0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:35 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 756.146715][ T2084] Unknown options in mask d87b [ 756.255340][ T2089] Unknown options in mask d87b 10:07:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000002}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r2, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000080}, 0x24000850) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 756.296496][ T2094] FAULT_INJECTION: forcing a failure. [ 756.296496][ T2094] name failslab, interval 1, probability 0, space 0, times 0 10:07:35 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000400000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 756.378235][ T2094] CPU: 0 PID: 2094 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190627 #24 [ 756.392934][ T2094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.403053][ T2094] Call Trace: [ 756.406381][ T2094] dump_stack+0x172/0x1f0 [ 756.410833][ T2094] should_fail.cold+0xa/0x15 [ 756.415451][ T2094] ? fault_create_debugfs_attr+0x180/0x180 [ 756.421286][ T2094] ? ___might_sleep+0x163/0x280 [ 756.426168][ T2094] __should_failslab+0x121/0x190 [ 756.431131][ T2094] should_failslab+0x9/0x14 [ 756.435653][ T2094] __kmalloc+0x2e0/0x770 [ 756.439924][ T2094] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 756.446185][ T2094] ? fput_many+0x12c/0x1a0 [ 756.450629][ T2094] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 756.456899][ T2094] ? strnlen_user+0x1ed/0x2e0 [ 756.461601][ T2094] ? __x64_sys_memfd_create+0x13c/0x470 [ 756.467171][ T2094] __x64_sys_memfd_create+0x13c/0x470 [ 756.472574][ T2094] ? memfd_fcntl+0x18c0/0x18c0 [ 756.477363][ T2094] ? do_syscall_64+0x26/0x6a0 [ 756.482071][ T2094] ? lockdep_hardirqs_on+0x418/0x5d0 [ 756.487382][ T2094] ? trace_hardirqs_on+0x67/0x240 [ 756.492433][ T2094] do_syscall_64+0xfd/0x6a0 [ 756.496965][ T2094] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.502893][ T2094] RIP: 0033:0x459519 [ 756.506809][ T2094] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 756.526442][ T2094] RSP: 002b:00007f95a4a2aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 756.534872][ T2094] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 756.542918][ T2094] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 756.550985][ T2094] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 756.558977][ T2094] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95a4a2b6d4 [ 756.566972][ T2094] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 756.600466][ T2099] Unknown options in mask d87b 10:07:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:36 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000fffffff60000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:36 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:36 executing program 0: ioctl(0xffffffffffffffff, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 756.832761][ T2112] FAULT_INJECTION: forcing a failure. [ 756.832761][ T2112] name failslab, interval 1, probability 0, space 0, times 0 [ 756.887855][ T2112] CPU: 0 PID: 2112 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190627 #24 [ 756.896946][ T2112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.907022][ T2112] Call Trace: [ 756.910346][ T2112] dump_stack+0x172/0x1f0 [ 756.914708][ T2112] should_fail.cold+0xa/0x15 [ 756.919327][ T2112] ? fault_create_debugfs_attr+0x180/0x180 [ 756.925157][ T2112] ? ___might_sleep+0x163/0x280 [ 756.930035][ T2112] __should_failslab+0x121/0x190 [ 756.935023][ T2112] ? shmem_destroy_inode+0x80/0x80 [ 756.940155][ T2112] should_failslab+0x9/0x14 [ 756.944680][ T2112] kmem_cache_alloc+0x2aa/0x710 [ 756.949551][ T2112] ? __alloc_fd+0x487/0x620 [ 756.954089][ T2112] ? shmem_destroy_inode+0x80/0x80 [ 756.959233][ T2112] shmem_alloc_inode+0x1c/0x50 [ 756.964015][ T2112] alloc_inode+0x68/0x1e0 [ 756.968367][ T2112] new_inode_pseudo+0x19/0xf0 [ 756.973064][ T2112] new_inode+0x1f/0x40 [ 756.977151][ T2112] shmem_get_inode+0x84/0x7e0 [ 756.981855][ T2112] __shmem_file_setup.part.0+0x7e/0x2b0 [ 756.987440][ T2112] shmem_file_setup+0x66/0x90 [ 756.992139][ T2112] __x64_sys_memfd_create+0x2a2/0x470 [ 756.997529][ T2112] ? memfd_fcntl+0x18c0/0x18c0 [ 757.002317][ T2112] ? do_syscall_64+0x26/0x6a0 [ 757.007094][ T2112] ? lockdep_hardirqs_on+0x418/0x5d0 [ 757.007116][ T2112] ? trace_hardirqs_on+0x67/0x240 [ 757.007138][ T2112] do_syscall_64+0xfd/0x6a0 [ 757.007163][ T2112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.007177][ T2112] RIP: 0033:0x459519 [ 757.007194][ T2112] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.007211][ T2112] RSP: 002b:00007f95a4a2aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 757.014623][ T2121] Unknown options in mask d87b [ 757.017682][ T2112] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 757.017692][ T2112] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c 10:07:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000fffffdfc0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 757.017702][ T2112] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 757.017711][ T2112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95a4a2b6d4 [ 757.017721][ T2112] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 10:07:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:36 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 757.320217][ T2121] Unknown options in mask d87b 10:07:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000fffffffe0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 757.378643][ T2133] FAULT_INJECTION: forcing a failure. [ 757.378643][ T2133] name failslab, interval 1, probability 0, space 0, times 0 [ 757.413447][ T2133] CPU: 0 PID: 2133 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190627 #24 [ 757.422622][ T2133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.432701][ T2133] Call Trace: [ 757.436052][ T2133] dump_stack+0x172/0x1f0 [ 757.440422][ T2133] should_fail.cold+0xa/0x15 [ 757.445053][ T2133] ? fault_create_debugfs_attr+0x180/0x180 [ 757.450909][ T2133] ? ___might_sleep+0x163/0x280 [ 757.455797][ T2133] __should_failslab+0x121/0x190 [ 757.460760][ T2133] should_failslab+0x9/0x14 [ 757.465324][ T2133] kmem_cache_alloc+0x2aa/0x710 [ 757.470223][ T2133] ? current_time+0x6b/0x140 [ 757.474834][ T2133] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 757.474857][ T2133] ? lockdep_hardirqs_on+0x418/0x5d0 [ 757.474876][ T2133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.474902][ T2133] ? timespec64_trunc+0xf0/0x180 [ 757.474927][ T2133] __d_alloc+0x2e/0x8c0 [ 757.488620][ T2133] d_alloc_pseudo+0x1e/0x70 [ 757.488642][ T2133] alloc_file_pseudo+0xe2/0x280 [ 757.488662][ T2133] ? alloc_file+0x4d0/0x4d0 [ 757.488683][ T2133] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 757.488711][ T2133] __shmem_file_setup.part.0+0x108/0x2b0 [ 757.529874][ T2133] shmem_file_setup+0x66/0x90 [ 757.534594][ T2133] __x64_sys_memfd_create+0x2a2/0x470 [ 757.540084][ T2133] ? memfd_fcntl+0x18c0/0x18c0 [ 757.544889][ T2133] ? do_syscall_64+0x26/0x6a0 [ 757.549597][ T2133] ? lockdep_hardirqs_on+0x418/0x5d0 [ 757.554951][ T2133] ? trace_hardirqs_on+0x67/0x240 [ 757.560012][ T2133] do_syscall_64+0xfd/0x6a0 [ 757.564545][ T2133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.570481][ T2133] RIP: 0033:0x459519 [ 757.574399][ T2133] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.594059][ T2133] RSP: 002b:00007f95a4a2aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 757.602492][ T2133] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 757.610484][ T2133] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 757.618478][ T2133] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 10:07:36 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000ff0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:36 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffff, 0x100) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x16, 0x3, 0x1, 0x7, 0x82, r0, 0x7, [], r1, 0xffffffffffffff9c, 0x4, 0x5}, 0x3c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r3 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000240)={0xc72f, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1, 0x3, [{{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}}]}, 0x210) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) [ 757.626467][ T2133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95a4a2b6d4 [ 757.634476][ T2133] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 757.701783][ T2135] XFS (loop3): Mounting V4 Filesystem 10:07:37 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:37 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 757.781641][ T2135] XFS (loop3): empty log check failed [ 757.818809][ T2135] XFS (loop3): log mount/recovery failed: error -5 10:07:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000fcfdffff0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 757.868855][ T2155] FAULT_INJECTION: forcing a failure. [ 757.868855][ T2155] name failslab, interval 1, probability 0, space 0, times 0 [ 757.920007][ T2151] Unknown options in mask d87b [ 757.941207][ T2135] XFS (loop3): log mount failed [ 757.979616][ T2155] CPU: 0 PID: 2155 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190627 #24 [ 757.988998][ T2155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.999078][ T2155] Call Trace: [ 758.002393][ T2155] dump_stack+0x172/0x1f0 [ 758.006760][ T2155] should_fail.cold+0xa/0x15 [ 758.011388][ T2155] ? fault_create_debugfs_attr+0x180/0x180 [ 758.017221][ T2155] ? ___might_sleep+0x163/0x280 [ 758.022099][ T2155] __should_failslab+0x121/0x190 10:07:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f00000003c0)="c0dca505a9625898cb8fb9bc5f2e3a3b5e9f615e0bcfec7be0701badc97337ae3abce33318afc695083212c26e0eeb3f539267eb9b7caf8f4370c98b247540ea6f1af896501fe0dea84fe61c020cf1dc0000000037244e3342d13dcdcb96b23d2d352a189a22ec17eb036dda4ecf360e5ca85a2e4fa3d8bb0db5d1266b3e2a82000000") r1 = socket(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)={r2, 0x6, 0x4, [0x5, 0x8, 0x4, 0xa896]}, &(0x7f0000000380)=0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000780)=ANY=[@ANYBLOB="38010000100001050000000000000000ff02009e000000000000000000000001ff020000000000000000000000000001004000000000000000000000000000008534ecbaa05fde62c3c21bfba764badbe4a492b74077ac3228577e47ecb91d930938f887e0ba5f2711a978dd271b7a00f981a7e7042589069daa484f18973b0ec6747164f6dc862cc6705450cc349a476b094eb95e8a2543f58094c38024f32c99ce5de8842f7a285d498b47d1fc0d5a6e500082a2c5e7b6bb8381b7d786599ffe76c8e1e48ae10abf565826bb5c135b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe800000000000000000000000000000000000006c000000ac1414000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480003006465666c61746500"/240], 0x138}}, 0x0) pwrite64(r1, &(0x7f00000000c0)="b9e45b", 0x3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) r5 = dup2(r4, r0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r5, 0x800455d1, &(0x7f0000000100)) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x8001) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=ANY=[]) sync_file_range(r0, 0xffff, 0x80000000, 0x4) [ 758.027073][ T2155] should_failslab+0x9/0x14 [ 758.031691][ T2155] kmem_cache_alloc+0x2aa/0x710 [ 758.036564][ T2155] ? rwlock_bug.part.0+0x90/0x90 [ 758.041524][ T2155] ? lock_downgrade+0x920/0x920 [ 758.046401][ T2155] __alloc_file+0x27/0x300 [ 758.050853][ T2155] alloc_empty_file+0x72/0x170 [ 758.055657][ T2155] alloc_file+0x5e/0x4d0 [ 758.060028][ T2155] alloc_file_pseudo+0x189/0x280 [ 758.064991][ T2155] ? alloc_file+0x4d0/0x4d0 [ 758.069523][ T2155] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 758.075798][ T2155] __shmem_file_setup.part.0+0x108/0x2b0 [ 758.081458][ T2155] shmem_file_setup+0x66/0x90 [ 758.086159][ T2155] __x64_sys_memfd_create+0x2a2/0x470 [ 758.091556][ T2155] ? memfd_fcntl+0x18c0/0x18c0 [ 758.096371][ T2155] ? do_syscall_64+0x26/0x6a0 [ 758.099418][ T2165] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 758.101068][ T2155] ? lockdep_hardirqs_on+0x418/0x5d0 [ 758.101090][ T2155] ? trace_hardirqs_on+0x67/0x240 [ 758.101114][ T2155] do_syscall_64+0xfd/0x6a0 [ 758.101140][ T2155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.101153][ T2155] RIP: 0033:0x459519 [ 758.101169][ T2155] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.101178][ T2155] RSP: 002b:00007f95a4a2aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 758.101193][ T2155] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 758.101203][ T2155] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c 10:07:37 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000f6ffffff0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 758.101213][ T2155] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 758.101223][ T2155] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95a4a2b6d4 [ 758.101245][ T2155] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 758.165921][ T2165] Unknown options in mask d87b 10:07:37 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 758.269799][ T2165] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.0'. [ 758.417673][ T2178] FAULT_INJECTION: forcing a failure. [ 758.417673][ T2178] name failslab, interval 1, probability 0, space 0, times 0 [ 758.430743][ T2178] CPU: 0 PID: 2178 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190627 #24 [ 758.439797][ T2178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.455408][ T2178] Call Trace: [ 758.460209][ T2178] dump_stack+0x172/0x1f0 [ 758.464578][ T2178] should_fail.cold+0xa/0x15 [ 758.469190][ T2178] ? fault_create_debugfs_attr+0x180/0x180 [ 758.475028][ T2178] ? ___might_sleep+0x163/0x280 [ 758.479918][ T2178] __should_failslab+0x121/0x190 [ 758.484895][ T2178] should_failslab+0x9/0x14 [ 758.489421][ T2178] kmem_cache_alloc+0x2aa/0x710 [ 758.494391][ T2178] ? rcu_read_lock_sched_held+0x110/0x130 [ 758.500130][ T2178] ? kmem_cache_alloc+0x361/0x710 [ 758.505181][ T2178] security_file_alloc+0x39/0x170 [ 758.510232][ T2178] __alloc_file+0xac/0x300 [ 758.514681][ T2178] alloc_empty_file+0x72/0x170 [ 758.519474][ T2178] alloc_file+0x5e/0x4d0 [ 758.523742][ T2178] alloc_file_pseudo+0x189/0x280 [ 758.528699][ T2178] ? alloc_file+0x4d0/0x4d0 [ 758.533227][ T2178] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 758.539514][ T2178] __shmem_file_setup.part.0+0x108/0x2b0 [ 758.545176][ T2178] shmem_file_setup+0x66/0x90 [ 758.549892][ T2178] __x64_sys_memfd_create+0x2a2/0x470 [ 758.555294][ T2178] ? memfd_fcntl+0x18c0/0x18c0 [ 758.560073][ T2178] ? do_syscall_64+0x26/0x6a0 [ 758.564774][ T2178] ? lockdep_hardirqs_on+0x418/0x5d0 [ 758.570080][ T2178] ? trace_hardirqs_on+0x67/0x240 [ 758.575132][ T2178] do_syscall_64+0xfd/0x6a0 [ 758.579664][ T2178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.585691][ T2178] RIP: 0033:0x459519 [ 758.590802][ T2178] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.610430][ T2178] RSP: 002b:00007f95a4a2aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 758.618869][ T2178] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 758.626864][ T2178] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c [ 758.634893][ T2178] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 758.643332][ T2178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95a4a2b6d4 [ 758.651329][ T2178] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 10:07:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x01', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000feffffff0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000280)=0x7, 0x4) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r3 = dup(r2) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x9, 0x30, 0x8, 0x6}, &(0x7f0000000040)=0x18) fstatfs(r2, &(0x7f0000000180)=""/19) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000000c0)={r4, 0x3}, 0x8) ioctl$CAPI_GET_MANUFACTURER(r3, 0xc0044306, &(0x7f00000002c0)) ioctl$TIOCNOTTY(r3, 0x5422) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={r4, 0x8cd, 0x20}, &(0x7f0000000140)=0xc) 10:07:38 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 758.858732][ T2191] FAULT_INJECTION: forcing a failure. [ 758.858732][ T2191] name failslab, interval 1, probability 0, space 0, times 0 [ 758.949992][ T2191] CPU: 0 PID: 2191 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190627 #24 [ 758.959082][ T2191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.969268][ T2191] Call Trace: [ 758.972593][ T2191] dump_stack+0x172/0x1f0 [ 758.976961][ T2191] should_fail.cold+0xa/0x15 [ 758.981596][ T2191] ? fault_create_debugfs_attr+0x180/0x180 [ 758.987440][ T2191] ? ___might_sleep+0x163/0x280 [ 758.992325][ T2191] __should_failslab+0x121/0x190 [ 758.997291][ T2191] should_failslab+0x9/0x14 [ 759.001819][ T2191] kmem_cache_alloc+0x2aa/0x710 [ 759.006693][ T2191] ? rcu_read_lock_sched_held+0x110/0x130 [ 759.006710][ T2191] ? kmem_cache_alloc+0x361/0x710 [ 759.006734][ T2191] security_file_alloc+0x39/0x170 [ 759.006755][ T2191] __alloc_file+0xac/0x300 [ 759.006778][ T2191] alloc_empty_file+0x72/0x170 [ 759.027067][ T2191] alloc_file+0x5e/0x4d0 [ 759.036096][ T2191] alloc_file_pseudo+0x189/0x280 [ 759.041064][ T2191] ? alloc_file+0x4d0/0x4d0 [ 759.045600][ T2191] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 759.051895][ T2191] __shmem_file_setup.part.0+0x108/0x2b0 [ 759.057559][ T2191] shmem_file_setup+0x66/0x90 [ 759.062262][ T2191] __x64_sys_memfd_create+0x2a2/0x470 [ 759.067749][ T2191] ? memfd_fcntl+0x18c0/0x18c0 [ 759.072536][ T2191] ? do_syscall_64+0x26/0x6a0 [ 759.077244][ T2191] ? lockdep_hardirqs_on+0x418/0x5d0 [ 759.082556][ T2191] ? trace_hardirqs_on+0x67/0x240 [ 759.087696][ T2191] do_syscall_64+0xfd/0x6a0 [ 759.092222][ T2191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.098126][ T2191] RIP: 0033:0x459519 [ 759.102040][ T2191] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.121666][ T2191] RSP: 002b:00007f95a4a2aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 759.130192][ T2191] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459519 [ 759.138188][ T2191] RDX: 0000000020000128 RSI: 0000000000000000 RDI: 00000000004be40c 10:07:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x800001100000890e, &(0x7f0000000140)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000100)=""/10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8bbad867db1f9701}, 0xc, &(0x7f0000000340)={&(0x7f0000000700)=ANY=[@ANYBLOB="eeffffff4dcf52990500000015f232f882db81adca2e5f99404fcba7f7fca5c698710f09c12a4d01ce570c59a6c6a4ad685249ea600ee0b8cbb7234608f00e633951b44209447a93e311f81fa74aea55283d74c68e2a28ad9010adaa000000000000000000", @ANYRES16=r3, @ANYBLOB="010029bd70000900000010000000240001000800080000010000080009007b00000008000b007369700008000500040000000800060009000000080006000000000050000300140006006fef967b74f220ce9c0f7e9ad0c5e3ef14000600fe8000000000000000000000000000aa080008000300000014000200626373663000000000000000000000000800030001000000080006000600000008000500060000001c00030008000300040000000800080006000000080004000100000008000500ffff00000800060083000000"], 0xd4}, 0x1, 0x0, 0x0, 0x10}, 0x40) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x402240) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f00000003c0)=""/171, &(0x7f0000000480)=0xab) ioctl$KVM_SET_BOOT_CPU_ID(r4, 0xae78, &(0x7f0000000080)) 10:07:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000200000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 759.146183][ T2191] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 759.154177][ T2191] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f95a4a2b6d4 [ 759.162195][ T2191] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 759.170530][ C0] net_ratelimit: 19 callbacks suppressed [ 759.170545][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 759.182099][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000300000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:38 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:38 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000400000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 759.531517][ T2224] FAULT_INJECTION: forcing a failure. [ 759.531517][ T2224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 759.544872][ T2224] CPU: 1 PID: 2224 Comm: syz-executor.4 Not tainted 5.2.0-rc6-next-20190627 #24 [ 759.553936][ T2224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.564003][ T2224] Call Trace: [ 759.567513][ T2224] dump_stack+0x172/0x1f0 [ 759.571873][ T2224] should_fail.cold+0xa/0x15 [ 759.576495][ T2224] ? fault_create_debugfs_attr+0x180/0x180 [ 759.582409][ T2224] ? is_bpf_text_address+0xac/0x170 [ 759.587641][ T2224] should_fail_alloc_page+0x50/0x60 [ 759.592857][ T2224] __alloc_pages_nodemask+0x1a1/0x8f0 [ 759.598249][ T2224] ? __alloc_pages_slowpath+0x2520/0x2520 [ 759.603983][ T2224] ? kasan_check_read+0x11/0x20 [ 759.608858][ T2224] ? fault_create_debugfs_attr+0x180/0x180 [ 759.614690][ T2224] cache_grow_begin+0x90/0xd20 [ 759.619474][ T2224] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 759.625210][ T2224] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.631472][ T2224] __kmalloc+0x6af/0x770 [ 759.635740][ T2224] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 759.641481][ T2224] tomoyo_realpath_from_path+0xcd/0x7a0 [ 759.647047][ T2224] ? tomoyo_path_perm+0x1cb/0x430 [ 759.652109][ T2224] tomoyo_path_perm+0x230/0x430 [ 759.656975][ T2224] ? tomoyo_path_perm+0x1cb/0x430 [ 759.662032][ T2224] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 759.668485][ T2224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.674819][ T2224] tomoyo_path_truncate+0x1d/0x30 [ 759.679875][ T2224] security_path_truncate+0xf2/0x150 [ 759.680904][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 759.685181][ T2224] do_sys_ftruncate+0x3d9/0x550 [ 759.685208][ T2224] __x64_sys_ftruncate+0x59/0x80 [ 759.685230][ T2224] do_syscall_64+0xfd/0x6a0 [ 759.685255][ T2224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.685274][ T2224] RIP: 0033:0x4594e7 [ 759.691088][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 759.695850][ T2224] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.740396][ T2224] RSP: 002b:00007f95a4a2aa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 759.748911][ T2224] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004594e7 [ 759.756884][ T2224] RDX: 0000000020000128 RSI: 0000000008100000 RDI: 0000000000000004 [ 759.764865][ T2224] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 759.773049][ T2224] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 10:07:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000500000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x14000000000000, 0x1) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000040)={0xd6d3, 0x9, 0x100, 0xa7}, 0x10) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 759.781023][ T2224] R13: 00000000004c858e R14: 00000000004df0e0 R15: 0000000000000003 [ 759.789268][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 759.795201][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:07:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 759.924542][ T2224] XFS (loop4): Mounting V4 Filesystem 10:07:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000600000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 759.968776][ T2224] XFS (loop4): empty log check failed 10:07:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) socket$inet6_sctp(0xa, 0x1, 0x84) [ 760.035238][ T2224] XFS (loop4): log mount/recovery failed: error -5 [ 760.080117][ T2224] XFS (loop4): log mount failed 10:07:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000700000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x308) [ 760.240975][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 760.246946][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:39 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000800000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20082, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000003000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000000040)=0x1) setsockopt$inet_tcp_buf(r1, 0x6, 0x3d, &(0x7f00000000c0)="0262ce4c35f41e0c832e0560c704c84fb8f14c64592241bcec1ac42d19717506809b0980d11a9983982f03b986a820a018291d4e89b6f0bf1bcfe5c9bdfe9460aee343d34652615633a4ee61f1f54b5bfe1f6dd9b979cf3f6491c429eb723df1fb2e506a460bef5101a448074eb1125a3c6e4af1549c70c16562263048c2f39cb28f4ac6e1134af52a539dccb9fdc9e901d8c57e38380a0275b0da134cad459cc41e6e873735414047c8a8d698bdd66be5d32d68ba9617baf2e199b95f4b2fff999f1a80757a80079152df6fe902c706d1cae9f283", 0xd5) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 760.767849][ T2281] XFS (loop4): Mounting V4 Filesystem [ 760.834276][ T2281] XFS (loop4): empty log check failed [ 760.853099][ T2281] XFS (loop4): log mount/recovery failed: error -5 [ 760.880929][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 760.886758][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:40 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000005000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 760.941672][ T2281] XFS (loop4): log mount failed [ 760.955478][ T2297] connlabel_mt_check: 10 callbacks suppressed [ 760.955487][ T2297] Unknown options in mask d87b 10:07:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x22000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000140)=0xe8) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000180)={0x2}) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x1000000, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@context={'context', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, 'broute\x00'}}]}}) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r3 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000006000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 761.277471][ T2316] Unknown options in mask d87b 10:07:40 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000007000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) sendmsg$sock(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="d44cc68b0a301ed1aab968544c980776dc8fd6990fd87e239ee6187c1bda6dc70108c4b24f6250ec81970393919b196628e0cc5dbdce340c82c15bef0e6a42a715fad16b056f7c81826dd9f33dc01f4b2ab50f0377103b7a8a215877f60778d78b113d34ef31e1848f70cdba3832dae860b4b7764f2cbcb5e7284bd415d8b91b279f943735fc54cf09579ffbb1cca9f356cbb6ea6a1ba0abf1b19c0a8f9942151de69cc1db4daad6ec012a7c98d5c6cc4fde2ba00efbe47277649c1b82692c0a239290f958994188eff2259cfcb7322e7a823815c73a94d54d851fe5ed73ec1d8ce1aaec5e84c13d2e8a0228717612ef", 0xf0}, {&(0x7f0000000000)="21467a12052322961cd7d0bdea52c510583fb813dcfe8c9d76c4bb9f0bf9541de1248dc84ed5643f1075edb131932b198c8acef34d0968a416107b88510ad44e1614a696f4dae388f9dfed9a39d30299452dfd32c5d1abacce2dff6670f77f40dd5b57", 0x63}, {&(0x7f0000000240)="8abc8a0697fc8d961b09ab7438769ea0ba6a1a6a93ba072151f3517fe45b35215b29ca832133b2addeecf08151a26c90fa75f919b29dd789afd6c97875431d77dfef5cd21cb17c20bf854c02240e8144aa11e83a8e33e2309d5b1741e3dffdb65beb2d449ea691b6416289a0fdcc096558fa862662aac2c176a1bd3e854c17ef93c4ff0df7040bf204b6013792fe9c5f22fd4db4bc2ede74197851a03c3efcb0de9dba1fe6e556a0e79591120a4d2ea4388c1e4bec21f05d0ef8c187d91bc69b6f2208312422df26f8", 0xc9}, {&(0x7f0000000340)="859e0b8dbad6916fbad4d44bbfdedb9530d0176169c645269dfbdd7f38fcbda6eac358c3f1f20afed8f3faf00900956cef389149d6fa61ed9def3abcbe0a4a0d79281bda32df08230d0ed91c6cb51983f25b1585b93685f5d85abb0fe60443b3cfd0ddcc25efba659d885c927a3caabeb65e242eecea83635c59", 0x7a}, {&(0x7f00000003c0)="1bdc39f4f7c68a50d22c1cf168db322fc2fd5d3d9f98a39c2207f0b266bff36dd24a4823686f6d8316235f1e8607456eb8b1b65db2b432b12c105ee07dd16256aed6b99254556e8f8f76cbb7ea5bd7a9ef201cd73def4dfb2d8ce7", 0x5b}, {&(0x7f0000000440)="c411db539f4b132afeda5a358fe6b23435cc88a48cf77cc49240530e8877f74482ee08505ac8620ab9c00c1fc064539d615f0d47480e5aeb90ac9fc4045cd861b5f6ac3c5f566dffa26391", 0x4b}], 0x6, &(0x7f0000000780)=[@mark={{0x14, 0x1, 0x24, 0x80000001}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0xf2}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x1bf}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0xc0}, 0x8005) [ 761.602751][ T2327] Unknown options in mask d87b 10:07:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000810000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40002, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) syz_init_net_socket$ax25(0x3, 0x5, 0xcf) [ 761.972660][ T2346] Unknown options in mask d87b 10:07:41 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 10:07:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='\\fs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000003f000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 762.076026][ T2351] Unknown options in mask d87b 10:07:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x3, 0x403) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000100)={0x5}) socket$inet_udplite(0x2, 0x2, 0x88) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x2f3) 10:07:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000040000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:41 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 10:07:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000005580)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/133, 0x85}], 0x1}, 0xfffffffffffffff8}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)=""/184, 0xb8}, {&(0x7f0000000040)=""/26, 0x1a}, {&(0x7f0000000180)}, {&(0x7f0000000300)=""/239, 0xef}, {&(0x7f0000000400)=""/62, 0x3e}], 0x5, &(0x7f0000000700)=""/14, 0xe}, 0x72}, {{&(0x7f0000000740)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f00000007c0)=""/17, 0x11}], 0x1, &(0x7f0000000840)=""/142, 0x8e}, 0x417}, {{&(0x7f0000000900)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000000980)=""/134, 0x86}, {&(0x7f0000000a40)=""/95, 0x5f}, {&(0x7f0000000ac0)=""/155, 0x9b}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/44, 0x2c}], 0x5, &(0x7f0000001c40)=""/197, 0xc5}, 0x1}, {{&(0x7f0000001d40)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000003040)=[{&(0x7f0000001dc0)=""/240, 0xf0}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/79, 0x4f}, {&(0x7f0000002f40)=""/211, 0xd3}], 0x4, &(0x7f0000003080)=""/172, 0xac}, 0x5}, {{0x0, 0x0, &(0x7f00000033c0)=[{&(0x7f0000003140)=""/172, 0xac}, {&(0x7f0000003200)=""/102, 0x66}, {&(0x7f0000003280)=""/21, 0x15}, {&(0x7f00000032c0)=""/33, 0x21}, {&(0x7f0000003300)=""/37, 0x25}, {&(0x7f0000003340)=""/82, 0x52}], 0x6}, 0xd01e}, {{&(0x7f0000003440)=@nl, 0x80, &(0x7f00000054c0)=[{&(0x7f00000034c0)=""/4096, 0x1000}, {&(0x7f00000044c0)=""/4096, 0x1000}], 0x2, &(0x7f0000005500)=""/89, 0x59}, 0x2fc9ad68}], 0x7, 0x1, &(0x7f0000005740)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 10:07:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000880000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000ff000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 763.066739][ T2403] Unknown options in mask d87b 10:07:42 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, 0x0, 0x0) 10:07:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000100100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 763.402983][ T2419] XFS (loop3): Mounting V4 Filesystem [ 763.469028][ T2419] XFS (loop3): empty log check failed [ 763.489536][ T2419] XFS (loop3): log mount/recovery failed: error -5 [ 763.531857][ T2419] XFS (loop3): log mount failed 10:07:42 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000200100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='x\\s\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 763.724631][ T2441] Unknown options in mask d87b 10:07:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61c", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000300100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x412440, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x49) connect$x25(r1, &(0x7f0000000000)={0x9, @remote={[], 0x3}}, 0x12) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) 10:07:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000400100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:43 executing program 0: io_setup(0x9, &(0x7f0000000040)=0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f00000002c0)={0x1, 0x1, [0x1ff, 0x0, 0x34e7, 0x0, 0x4, 0x1f, 0x0, 0x7]}) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80101, 0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x4, r2, &(0x7f00000021c0)="fc53bba3dfc492ce117ee9cd7774537d7de58f343079d3ca70fefbaa9ce34b36a68cc85a990f37fa957123109accbf9e76f000641fd74287b22657053137878b367289b0b977f38dbde19bd26c97a12d3ca04dc921abfd0d109cb5e996107bb0d6dae2f45cf764", 0x67, 0x0, 0x0, 0x0, r3}, &(0x7f0000000240)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x7f, &(0x7f0000000500)="ec7be09400000000160037b4626c73b88ebf6dbeb8d7f1c62489f9b1575498a2ea476794a323cb1279a55e67b1669742afa4c2477535a677654e217c0ac0e1b03f72759e79949a6c0f1d0c5147afcc7fac19ddf5f0624a94fc0daff225d788f3cde6d1a76ca184982eaa00c8ea21bc5d253c57d5df79b79a937ba76236eaf4b570424ab5a2726f5c2bf67ff2310e6f0f67b765f97e3cda31e4fa53d93aaf9511222726ef25d660c5f055946c23567e4bf56f15c79a77689b554e5e490c7c32ddeaa067c8c47a6c5d2e892dfdbafd0d2c2ecb16caed980a3fcbe9374aa51575f9e87032") socket(0xa, 0x2, 0x0) mkdir(&(0x7f0000005480)='./file0\x00', 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0xa, 0xffffffffffffffff) r6 = openat(r5, &(0x7f000052fff8)='./file0\x00', 0x800, 0x100) mknod(&(0x7f0000000000)='./file0\x00', 0x2000000008001, 0x401) r7 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r7, &(0x7f00000000c0), 0x1000000000000207, 0x0) symlinkat(&(0x7f00000000c0)='/', r6, &(0x7f0000d06ff8)='./file0\x00') chroot(&(0x7f0000002180)='.\x00') r8 = semget(0x1, 0x1, 0x630) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffb000/0x2000)=nil) semctl$SETVAL(r8, 0x3, 0x8, &(0x7f00000053c0)=0x9) r9 = socket(0x800000018, 0x400000000001, 0x0) semget$private(0x0, 0x3, 0x40) recvmsg(r9, &(0x7f0000005300)={0x0, 0x0, &(0x7f0000004280)=[{&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000180)=""/4096, 0x122a}, {&(0x7f0000001180)=""/4096, 0xfffffffffffffec5}, {&(0x7f0000005640)=""/4096, 0x1000}, {&(0x7f0000005540)=""/211, 0xd3}, {&(0x7f0000003280)=""/4096, 0x1000}], 0x6, &(0x7f0000004300)=""/4096, 0x1000}, 0x42) setsockopt$sock_int(r9, 0xffff, 0x800, 0x0, 0x0) ioctl$VT_OPENQRY(r9, 0x40047601, &(0x7f0000005440)) r10 = semget(0x3, 0x1008, 0x400) semctl$SETALL(r8, 0x0, 0x9, &(0x7f0000005400)=[0x2, 0x8bef, 0x7fff, 0x0]) semop(r10, &(0x7f00000000c0)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x800}, {0x4, 0x3, 0x1000}, {0x7, 0x3, 0x1000}, {0x1, 0x401, 0x1000}, {0x0, 0x9, 0x800}, {0x0, 0x34, 0x1000}, {0x0, 0x1f}], 0x8) connect(r9, &(0x7f0000000080)=@in={0x2, 0x1}, 0xc) 10:07:43 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, 0x0, 0x0) 10:07:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000500100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000600100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 764.400936][ C0] net_ratelimit: 20 callbacks suppressed [ 764.400945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 764.412473][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000700100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61c", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:44 executing program 0: ioctl(0xffffffffffffffff, 0x2, &(0x7f00000003c0)="b6b6a7ece1e810065a2d00000000000c9b750a5600100000000000003dbabf081ff054ec6027f8c6fc7e6e0a11534944b4e266fa3e93e2104c50c655746cafab09a5a2faa1484c4e25addb250507d53c99394e14708e889c3b9fa900117afcce1478bd0cfe6af1b60daaf8abd9fac80ea9e2186226469e6ee5") r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@broute={'broute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000140)=ANY=[]}, 0x78) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x3) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000040)) 10:07:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000800100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000100800100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 765.040874][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.046870][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 765.052796][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.058599][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:44 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, 0x0, 0x0) 10:07:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:44 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000800800100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 765.321831][ T2542] Unknown options in mask d87b 10:07:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 765.360880][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.366748][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, 0xfffffffffffffffd, 0x0, 0x0) pwrite64(r0, &(0x7f00000000c0)="3527d4c2ea930e334b6bf59a5560d1edd5602bb74e2cd0cd451463ad993e1d0ac5e2288e934ebfc70badf323f17bf873ff7e3e0080218d080389951d62dbfe00dfda1cc48127f20e706232b70a97bb7eb2ea0d2442524869f7941d2d0ed0e70983a4ba29e7a572a2ca73b0032117256a9f79525c31a5bd5d05203d0248780b2f01e4355b756d9fb4a5790266d0effeb8661d66320cdd9480ba21e3dd940cae7a5029b8957cd6c11f8a77f9664e39bf0435605d1bb81cbc91d58015448b02214bf7162e0340a6", 0xc6, 0x0) ioctl(0xffffffffffffffff, 0x4, &(0x7f0000000480)="c0dcc87664b6cfec7be070d966d8e286b49155954586ca9173d8a9b5244bf82d090c470ee4e404922a05122e18e36c7cdc72a9ed54f30f313e04cf5f6f3b4c7ff792792402788c3e6e0f7d3c6d232922fe528c449f92013accb5e3090ecfb052166bb3fa846cdf6dccbcb6021d37b911f240560ef81a5033b7f18c4a4f93ae513c57db7265661c93f3f7b724480af0f9f000") socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) [ 765.568387][ T2558] XFS (loop3): Mounting V4 Filesystem [ 765.625785][ T2558] XFS (loop3): empty log check failed [ 765.636227][ T2558] XFS (loop3): log mount/recovery failed: error -5 [ 765.732246][ T2558] XFS (loop3): log mount failed 10:07:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61c", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000003f00100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000001}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x64}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x22}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x80) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 765.920902][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.926776][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000004000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:45 executing program 2: io_setup(0x9, &(0x7f0000000040)=0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f00000002c0)={0x1, 0x1, [0x1ff, 0x0, 0x34e7, 0x0, 0x4, 0x1f, 0x0, 0x7]}) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x80101, 0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x4, r2, &(0x7f00000021c0)="fc53bba3dfc492ce117ee9cd7774537d7de58f343079d3ca70fefbaa9ce34b36a68cc85a990f37fa957123109accbf9e76f000641fd74287b22657053137878b367289b0b977f38dbde19bd26c97a12d3ca04dc921abfd0d109cb5e996107bb0d6dae2f45cf764", 0x67, 0x0, 0x0, 0x0, r3}, &(0x7f0000000240)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x7f, &(0x7f0000000500)="ec7be09400000000160037b4626c73b88ebf6dbeb8d7f1c62489f9b1575498a2ea476794a323cb1279a55e67b1669742afa4c2477535a677654e217c0ac0e1b03f72759e79949a6c0f1d0c5147afcc7fac19ddf5f0624a94fc0daff225d788f3cde6d1a76ca184982eaa00c8ea21bc5d253c57d5df79b79a937ba76236eaf4b570424ab5a2726f5c2bf67ff2310e6f0f67b765f97e3cda31e4fa53d93aaf9511222726ef25d660c5f055946c23567e4bf56f15c79a77689b554e5e490c7c32ddeaa067c8c47a6c5d2e892dfdbafd0d2c2ecb16caed980a3fcbe9374aa51575f9e87032") socket(0xa, 0x2, 0x0) mkdir(&(0x7f0000005480)='./file0\x00', 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0xa, 0xffffffffffffffff) r6 = openat(r5, &(0x7f000052fff8)='./file0\x00', 0x800, 0x100) mknod(&(0x7f0000000000)='./file0\x00', 0x2000000008001, 0x401) r7 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) pwritev(r7, &(0x7f00000000c0), 0x1000000000000207, 0x0) symlinkat(&(0x7f00000000c0)='/', r6, &(0x7f0000d06ff8)='./file0\x00') chroot(&(0x7f0000002180)='.\x00') r8 = semget(0x1, 0x1, 0x630) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffb000/0x2000)=nil) semctl$SETVAL(r8, 0x3, 0x8, &(0x7f00000053c0)=0x9) r9 = socket(0x800000018, 0x400000000001, 0x0) semget$private(0x0, 0x3, 0x40) recvmsg(r9, &(0x7f0000005300)={0x0, 0x0, &(0x7f0000004280)=[{&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000180)=""/4096, 0x122a}, {&(0x7f0000001180)=""/4096, 0xfffffffffffffec5}, {&(0x7f0000005640)=""/4096, 0x1000}, {&(0x7f0000005540)=""/211, 0xd3}, {&(0x7f0000003280)=""/4096, 0x1000}], 0x6, &(0x7f0000004300)=""/4096, 0x1000}, 0x42) setsockopt$sock_int(r9, 0xffff, 0x800, 0x0, 0x0) ioctl$VT_OPENQRY(r9, 0x40047601, &(0x7f0000005440)) r10 = semget(0x3, 0x1008, 0x400) semctl$SETALL(r8, 0x0, 0x9, &(0x7f0000005400)=[0x2, 0x8bef, 0x7fff, 0x0]) semop(r10, &(0x7f00000000c0)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x800}, {0x4, 0x3, 0x1000}, {0x7, 0x3, 0x1000}, {0x1, 0x401, 0x1000}, {0x0, 0x9, 0x800}, {0x0, 0x34, 0x1000}, {0x0, 0x1f}], 0x8) connect(r9, &(0x7f0000000080)=@in={0x2, 0x1}, 0xc) [ 766.080422][ T2583] Unknown options in mask d87b 10:07:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000fffffff600100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:45 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000fffffdfc00100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 766.435589][ T2606] Unknown options in mask d87b [ 766.459038][ T2608] XFS (loop3): Mounting V4 Filesystem [ 766.493862][ T2617] Unknown options in mask d87b [ 766.531757][ T2608] XFS (loop3): empty log check failed 10:07:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x400002) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") getsockname$inet(r0, &(0x7f0000000180), &(0x7f0000000240)=0x10) r2 = socket(0xb, 0x200000004, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000000c0)={r3, 0x1}, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x2c5) [ 766.563454][ T2608] XFS (loop3): log mount/recovery failed: error -5 [ 766.671155][ T2608] XFS (loop3): log mount failed 10:07:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:46 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000fffffffe00100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf/\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000100)="c0dca5055e0bcfec7bc570") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/555]}, 0x2a3) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x313, 0x9, 0xcb, 0x1, 0x7, @dev={[], 0x15}}, 0x10) bind$vsock_dgram(r1, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) [ 767.063303][ T2643] XFS (loop2): Mounting V4 Filesystem 10:07:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000000000ff00100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pread64(r0, &(0x7f00000000c0)=""/227, 0xe3, 0x0) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 767.157084][ T2643] XFS (loop2): empty log check failed [ 767.212496][ T2643] XFS (loop2): log mount/recovery failed: error -5 10:07:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000fcfdffff00100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 767.311100][ T2643] XFS (loop2): log mount failed [ 767.357251][ T2668] Unknown options in mask d87b [ 767.419954][ T2677] Unknown options in mask d87b 10:07:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x826, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x800000000000000}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x11) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:46 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000f6ffffff00100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 767.548033][ T2679] XFS (loop3): Mounting V4 Filesystem [ 767.577904][ T2679] XFS (loop3): empty log check failed [ 767.585027][ T2679] XFS (loop3): log mount/recovery failed: error -5 [ 767.646519][ T2694] Unknown options in mask d87b [ 767.681796][ T2679] XFS (loop3): log mount failed 10:07:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10000, 0x0) ioctl$CAPI_INSTALLED(r1, 0x80024322) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f00000000c0)={0x6, 0x80}) fchdir(r0) r2 = socket(0xa, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x87ffd, 0x0) 10:07:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000feffffff00100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f00000003c0)="c0dca505a9625898cb8fb9bc5f2e3a3b5e9f615e0bcfec7be0701badc97337ae3abce33318afc695083212c26e0eeb3f539267eb9b7caf8f4370c98b247540ea6f1af896501fe0dea84fe61c020cf1dc0000000037244e3342d13dcdcb96b23d2d352a189a22ec17eb036dda4ecf360e5ca85a2e4fa3d8bb0db5d1266b3e2a82000000") r1 = socket(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140)={0x2, [0x0, 0x0]}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)={r2, 0x6, 0x4, [0x5, 0x8, 0x4, 0xa896]}, &(0x7f0000000380)=0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000780)=ANY=[@ANYBLOB="38010000100001050000000000000000ff02009e000000000000000000000001ff020000000000000000000000000001004000000000000000000000000000008534ecbaa05fde62c3c21bfba764badbe4a492b74077ac3228577e47ecb91d930938f887e0ba5f2711a978dd271b7a00f981a7e7042589069daa484f18973b0ec6747164f6dc862cc6705450cc349a476b094eb95e8a2543f58094c38024f32c99ce5de8842f7a285d498b47d1fc0d5a6e500082a2c5e7b6bb8381b7d786599ffe76c8e1e48ae10abf565826bb5c135b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe800000000000000000000000000000000000006c000000ac1414000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480003006465666c61746500"/240], 0x138}}, 0x0) pwrite64(r1, &(0x7f00000000c0)="b9e45b", 0x3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) r5 = dup2(r4, r0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r5, 0x800455d1, &(0x7f0000000100)) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x8001) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=ANY=[]) sync_file_range(r0, 0xffff, 0x80000000, 0x4) 10:07:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000002000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 768.141062][ T2725] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.2'. 10:07:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xf\\\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/551]}, 0x29f) [ 768.330090][ T2729] Unknown options in mask d87b 10:07:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRES16]}, 0x7a) 10:07:47 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000003000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x40000000000000a, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) [ 768.617899][ T2744] XFS (loop3): Mounting V4 Filesystem [ 768.674101][ T2744] XFS (loop3): empty log check failed [ 768.708633][ T2744] XFS (loop3): log mount/recovery failed: error -5 [ 768.800925][ T2744] XFS (loop3): log mount failed 10:07:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:48 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000004000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]}, 0x2eb) 10:07:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xb, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x414000, 0x0) readlinkat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)=""/176, 0xb0) getsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 769.171284][ T2776] XFS (loop2): Mounting V4 Filesystem [ 769.251066][ T2776] XFS (loop2): empty log check failed [ 769.265170][ T2776] XFS (loop2): log mount/recovery failed: error -5 [ 769.321242][ T2776] XFS (loop2): log mount failed 10:07:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000005000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x8, 0x3, 0xffffffff08000000) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/566]}, 0x2ae) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000040)=0x6) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r2, 0x89e2, &(0x7f0000000180)={0x3, @null, r3}) 10:07:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 769.520894][ C0] net_ratelimit: 20 callbacks suppressed [ 769.520904][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 769.532435][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:48 executing program 0: r0 = socket$inet(0x2, 0x80f, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) socket$inet(0x2, 0x5, 0x1) ioctl$SIOCRSACCEPT(r2, 0x89e3) 10:07:48 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000006000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 769.700700][ T2812] Unknown options in mask d87b 10:07:49 executing program 2 (fault-call:4 fault-nth:0): r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 769.891619][ T2812] Unknown options in mask d87b 10:07:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000007000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x8000) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000040)='broute\x00', &(0x7f00000000c0)='loeth1\x00', 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 770.080868][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 770.086723][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000008000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 770.137656][ T2846] FAULT_INJECTION: forcing a failure. [ 770.137656][ T2846] name failslab, interval 1, probability 0, space 0, times 0 [ 770.160883][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 770.166746][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 770.239315][ T2845] Unknown options in mask d87b [ 770.240132][ T2846] CPU: 1 PID: 2846 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190627 #24 [ 770.253179][ T2846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.263248][ T2846] Call Trace: [ 770.266563][ T2846] dump_stack+0x172/0x1f0 [ 770.270928][ T2846] should_fail.cold+0xa/0x15 [ 770.275547][ T2846] ? fault_create_debugfs_attr+0x180/0x180 [ 770.281392][ T2846] ? ___might_sleep+0x163/0x280 [ 770.286280][ T2846] __should_failslab+0x121/0x190 [ 770.291249][ T2846] should_failslab+0x9/0x14 [ 770.295772][ T2846] kmem_cache_alloc_trace+0x2d3/0x790 [ 770.301160][ T2846] ? aa_path_link+0x340/0x340 [ 770.305861][ T2846] ? __fget+0x35d/0x560 [ 770.310093][ T2846] sg_read+0xab5/0x1890 [ 770.314282][ T2846] ? sg_remove_device+0x3a0/0x3a0 [ 770.319358][ T2846] ? __fget+0x384/0x560 [ 770.323558][ T2846] ? security_file_permission+0x8f/0x380 [ 770.329214][ T2846] __vfs_read+0x8a/0x110 [ 770.333474][ T2846] ? sg_remove_device+0x3a0/0x3a0 10:07:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000030000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 770.338554][ T2846] vfs_read+0x1f0/0x440 [ 770.342744][ T2846] ksys_read+0x14f/0x290 [ 770.347010][ T2846] ? kernel_write+0x130/0x130 [ 770.351729][ T2846] ? do_syscall_64+0x26/0x6a0 [ 770.356430][ T2846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.362511][ T2846] ? do_syscall_64+0x26/0x6a0 [ 770.367220][ T2846] __x64_sys_read+0x73/0xb0 [ 770.371751][ T2846] do_syscall_64+0xfd/0x6a0 [ 770.376284][ T2846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.382191][ T2846] RIP: 0033:0x459519 10:07:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000050000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 770.386101][ T2846] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 770.405825][ T2846] RSP: 002b:00007f81570e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 770.414266][ T2846] RAX: ffffffffffffffda RBX: 00007f81570e5c90 RCX: 0000000000459519 [ 770.422256][ T2846] RDX: 0000000000001000 RSI: 00000000200001c0 RDI: 0000000000000004 [ 770.430271][ T2846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 770.438266][ T2846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81570e66d4 [ 770.446260][ T2846] R13: 00000000004c674c R14: 00000000004db690 R15: 0000000000000005 10:07:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) write(r1, &(0x7f0000000000)="1bcaf87d5c1207944eb181989abb5336025e22cae18b3d593e72c1ee0935a9d74acdb82da5d5f4bce719a6ea01c2409c10fe61aea2383dc7c4841fc2a915e4084cfb774ae3be4913db36f6a7ef62b1d38f4586d78e8134964a1ebd090b39b42fd4a966fbcb9ea33c6a51fa9c8c91d9fb63db38d97868cc6b04c5eaadabd30b74", 0x80) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000100)) [ 770.513634][ T2844] XFS (loop3): Mounting V4 Filesystem [ 770.571119][ T2844] XFS (loop3): empty log check failed [ 770.588729][ T2844] XFS (loop3): log mount/recovery failed: error -5 10:07:49 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000060000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:49 executing program 2 (fault-call:4 fault-nth:1): r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 770.640991][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 770.646867][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 770.731626][ T2844] XFS (loop3): log mount failed 10:07:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000070000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 770.846967][ T2887] FAULT_INJECTION: forcing a failure. [ 770.846967][ T2887] name failslab, interval 1, probability 0, space 0, times 0 [ 770.895490][ T2887] CPU: 0 PID: 2887 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190627 #24 [ 770.895514][ T2887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.914748][ T2887] Call Trace: [ 770.918069][ T2887] dump_stack+0x172/0x1f0 [ 770.922441][ T2887] should_fail.cold+0xa/0x15 [ 770.922463][ T2887] ? fault_create_debugfs_attr+0x180/0x180 [ 770.922488][ T2887] ? ___might_sleep+0x163/0x280 [ 770.922510][ T2887] __should_failslab+0x121/0x190 [ 770.922531][ T2887] should_failslab+0x9/0x14 [ 770.922546][ T2887] kmem_cache_alloc_trace+0x2d3/0x790 [ 770.922575][ T2887] sg_read+0xf68/0x1890 [ 770.956759][ T2887] ? sg_remove_device+0x3a0/0x3a0 [ 770.961806][ T2887] ? __fget+0x384/0x560 [ 770.966035][ T2887] ? security_file_permission+0x8f/0x380 [ 770.971695][ T2887] __vfs_read+0x8a/0x110 [ 770.975964][ T2887] ? sg_remove_device+0x3a0/0x3a0 [ 770.981028][ T2887] vfs_read+0x1f0/0x440 [ 770.985393][ T2887] ksys_read+0x14f/0x290 [ 770.989662][ T2887] ? kernel_write+0x130/0x130 [ 770.994364][ T2887] ? do_syscall_64+0x26/0x6a0 [ 770.999069][ T2887] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.005164][ T2887] ? do_syscall_64+0x26/0x6a0 [ 771.009872][ T2887] __x64_sys_read+0x73/0xb0 [ 771.014418][ T2887] do_syscall_64+0xfd/0x6a0 [ 771.018984][ T2887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.024905][ T2887] RIP: 0033:0x459519 [ 771.028818][ T2887] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 771.048442][ T2887] RSP: 002b:00007f81570e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 771.056909][ T2887] RAX: ffffffffffffffda RBX: 00007f81570e5c90 RCX: 0000000000459519 [ 771.064953][ T2887] RDX: 0000000000001000 RSI: 00000000200001c0 RDI: 0000000000000004 [ 771.072942][ T2887] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 771.080935][ T2887] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81570e66d4 [ 771.089005][ T2887] R13: 00000000004c674c R14: 00000000004db690 R15: 0000000000000005 [ 771.280963][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 771.286834][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x1) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f0000000040)={0xe7}) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000008100000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:50 executing program 2 (fault-call:4 fault-nth:2): r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:50 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000003f0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 771.464773][ T2907] connlabel_mt_check: 2 callbacks suppressed [ 771.464783][ T2907] Unknown options in mask d87b [ 771.541367][ T2915] Unknown options in mask d87b 10:07:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendto$packet(r1, &(0x7f00000000c0)="ff704a57a6089620302c29a2b9f6e05e9c32197726e4f6a68b4a713ea4292bc3de1acd181df82e74be13f10428982934eaa60b5edf6cac5d2bc9502d13628a20bb58d13e7d591978e1df54fdf9844587eb870d785671f986917849532a9719582ddb5d2cfd1d89ba2389a0091dbdf91791b521c882ad331a8ad4e210d05786756770f3ed28c4a95b8b38e8b8ed0ef7fb53b880cb9fea6a4db227c8d0bb0bca2495ac2b958f2548ef9784d2a24669596cfc47839f802d93454c89b4ab558b075ec12c0d115cb7bf9fe9d0341e91", 0xcd, 0x0, &(0x7f0000000280)={0x11, 0x6, r2, 0x1, 0x10, 0x6, @random="73ada5679e9c"}, 0x14) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x2a8) [ 771.568918][ T2912] XFS (loop3): Mounting V4 Filesystem [ 771.612804][ T2912] XFS (loop3): empty log check failed [ 771.635799][ T2912] XFS (loop3): log mount/recovery failed: error -5 10:07:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000400000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000040)={0x0, 0x0}) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000100)=0x1000003e, 0x4) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) write$P9_RLCREATE(r3, &(0x7f0000000140)={0x18, 0xf, 0x1, {{0x40, 0x2, 0x1}}}, 0x18) r4 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000700)=@broute={'broute\x00', 0x20, 0x2, 0x6b, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000bc0)=ANY=[@ANYPTR64=&(0x7f0000000ac0)=ANY=[@ANYBLOB="0f617beb481f032116d23e73c9f8389004cb1d2e7e49ada5c661d931d56331b69c776f8b5741713f907156ccb8a036db2192653782b39f968434fc68a995da2eef24fef307f79dd74bd172150cbb9a9963a7e7f9fe47934da01d1b73ece815476dbbf22d516fbe183f", @ANYPTR=&(0x7f0000000a40)=ANY=[@ANYRES64, @ANYRES16=r0], @ANYPTR64=&(0x7f0000000a80)=ANY=[@ANYRES32=r4, @ANYRES16=r4, @ANYRESDEC=r1, @ANYRES16, @ANYRESDEC=r2], @ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRES16=r4, @ANYBLOB="3d3e633a4f480923f0c7442ed9448cd4cc1ac2741953f2be9742c1ba493758c2c18467f36ff8e826fdd08df75594750c7e"], @ANYRES16=r0, @ANYPTR64, @ANYPTR=&(0x7f0000000840)=ANY=[@ANYRESOCT=0x0], @ANYBLOB="29bc648e70b634c64cc0208c0ba7b6d9a3cdb3b010582c2bc8ff2025f559015cdeb16a524c484b4372b1e9fea93de2a308fd", @ANYPTR=&(0x7f0000000900)=ANY=[@ANYRESHEX=r0, @ANYBLOB="2cc7bc714e5f2988b505d5e825af01e482ab6f1c9f27b139a7da64f2be8d8324cc6c79bdc77447ff5b862cf0e342ff27100172b61d70931e78aebd34901e9312da1604399008f4f16a4b94d865ad4ccb0d2a9b97e5128647ee3281c6e23642b1f4e067defed162c39065a34eb977e36cd098eb702ea83f234a5f0e35f43a3121cc2951abfcdd2b96f07d027fba5557f35b9593eb827239f04f1e130630eb368ba2"], @ANYRESOCT=r2]}, 0xe3) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') [ 771.721110][ T2912] XFS (loop3): log mount failed 10:07:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000008800000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 772.192420][ T2909] FAULT_INJECTION: forcing a failure. [ 772.192420][ T2909] name failslab, interval 1, probability 0, space 0, times 0 [ 772.269792][ T2909] CPU: 0 PID: 2909 Comm: syz-executor.2 Not tainted 5.2.0-rc6-next-20190627 #24 [ 772.278890][ T2909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.288977][ T2909] Call Trace: [ 772.292285][ T2909] dump_stack+0x172/0x1f0 [ 772.296733][ T2909] should_fail.cold+0xa/0x15 [ 772.301325][ T2909] ? fault_create_debugfs_attr+0x180/0x180 [ 772.307154][ T2909] ? ___might_sleep+0x163/0x280 [ 772.312003][ T2909] __should_failslab+0x121/0x190 [ 772.316956][ T2909] should_failslab+0x9/0x14 [ 772.321450][ T2909] kmem_cache_alloc+0x2aa/0x710 [ 772.326291][ T2909] ? lock_downgrade+0x920/0x920 [ 772.331130][ T2909] taskstats_exit+0x6ba/0xcc7 [ 772.335796][ T2909] ? taskstats_user_cmd+0xce0/0xce0 [ 772.341011][ T2909] ? _raw_spin_unlock_irq+0x5e/0x90 [ 772.346199][ T2909] ? acct_collect+0x68b/0x850 [ 772.350866][ T2909] do_exit+0x40c/0x2ea0 [ 772.355030][ T2909] ? find_held_lock+0x35/0x130 [ 772.359780][ T2909] ? get_signal+0x392/0x2500 [ 772.364357][ T2909] ? mm_update_next_owner+0x640/0x640 [ 772.369718][ T2909] ? lock_downgrade+0x920/0x920 [ 772.374556][ T2909] ? _raw_spin_unlock_irq+0x28/0x90 [ 772.379747][ T2909] ? get_signal+0x392/0x2500 [ 772.384326][ T2909] ? _raw_spin_unlock_irq+0x28/0x90 [ 772.389518][ T2909] do_group_exit+0x135/0x360 [ 772.394099][ T2909] get_signal+0x47c/0x2500 [ 772.398506][ T2909] ? __fget+0x384/0x560 [ 772.402691][ T2909] do_signal+0x87/0x1700 [ 772.406931][ T2909] ? kick_process+0xef/0x180 [ 772.411623][ T2909] ? task_work_add+0x9c/0x120 [ 772.416472][ T2909] ? setup_sigcontext+0x7d0/0x7d0 [ 772.421616][ T2909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 772.427871][ T2909] ? fput_many+0x12c/0x1a0 [ 772.432648][ T2909] ? ksys_read+0x1cf/0x290 [ 772.437056][ T2909] ? exit_to_usermode_loop+0x43/0x2d0 [ 772.442414][ T2909] ? do_syscall_64+0x5a9/0x6a0 [ 772.447162][ T2909] ? exit_to_usermode_loop+0x43/0x2d0 [ 772.452550][ T2909] ? lockdep_hardirqs_on+0x418/0x5d0 [ 772.457836][ T2909] ? trace_hardirqs_on+0x67/0x240 [ 772.462906][ T2909] exit_to_usermode_loop+0x251/0x2d0 [ 772.468190][ T2909] do_syscall_64+0x5a9/0x6a0 [ 772.472874][ T2909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.478760][ T2909] RIP: 0033:0x459519 [ 772.482848][ T2909] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 772.502481][ T2909] RSP: 002b:00007f81570e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 772.510915][ T2909] RAX: fffffffffffffe00 RBX: 00007f81570e5c90 RCX: 0000000000459519 10:07:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000000)='lo($\x00', 0x5) 10:07:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000ff0000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 772.518874][ T2909] RDX: 0000000000001000 RSI: 00000000200001c0 RDI: 0000000000000004 [ 772.526873][ T2909] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 772.534858][ T2909] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f81570e66d4 [ 772.542828][ T2909] R13: 00000000004c674c R14: 00000000004db690 R15: 0000000000000005 10:07:51 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:07:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, 0x0) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:51 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000001100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 772.659034][ T2960] Unknown options in mask d87b 10:07:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x40) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000100)) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x3, 0x9) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x30a) 10:07:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000002100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 772.867983][ T2969] XFS (loop3): Mounting V4 Filesystem [ 772.915545][ T2969] XFS (loop3): empty log check failed [ 772.940938][ T2969] XFS (loop3): log mount/recovery failed: error -5 10:07:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) sendmsg$xdp(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x2c, 0x2, r1, 0x21}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000700)="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", 0x1000}, {&(0x7f00000002c0)="717859932f89668c2dac668b7e758588d66cf84cea8ded87d98c81890b41dfe844c557cfd6e90bc6c4ecf5ae40cf872c5e361e183bb6ee499f3ec8907835e79d60", 0x41}], 0x2, 0x0, 0x0, 0x20000004}, 0x891) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/545]}, 0x299) [ 773.030963][ T2969] XFS (loop3): log mount failed 10:07:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000003100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0xb, 0xfffffffffffffffe) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:52 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000004100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:53 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x23) 10:07:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000005100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x400011000008919, &(0x7f0000000100)) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) accept$alg(r1, 0x0, 0x0) 10:07:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000006100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 774.070366][ T3049] Unknown options in mask d87b 10:07:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1100000890c, &(0x7f0000000240)="c0dca5055e0bcfec35e070897b56d7eb1d1c3407b4e129bc7a5d5f9cfbaea5488f70cd174ee74764228874bf340a549728440155f634452d1d051b73c2388f45ff61088fb957b1130284e64931be2bfb860800eff715b4ce0609e14003326783ddf04b2dbea8bb075fb0c409490e36fc813d00a97843090d78340893eef23cfac9a015afcf9b57c83fcab6917d7e04ef154ca38dcad9") r1 = socket(0xa, 0x2, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x340, 0x0) r3 = getpgrp(0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x7ff, 0xcda4, 0x400, 0x30, 0x4, r3}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) [ 774.123314][ T3040] XFS (loop3): Mounting V4 Filesystem [ 774.208182][ T3040] XFS (loop3): empty log check failed [ 774.221207][ T3040] XFS (loop3): log mount/recovery failed: error -5 10:07:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000007100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 774.310921][ T3040] XFS (loop3): log mount failed 10:07:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000008100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 774.448668][ T3074] Unknown options in mask d87b 10:07:53 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000001008100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 774.800968][ C0] net_ratelimit: 20 callbacks suppressed [ 774.800980][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 774.812660][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:54 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x57) 10:07:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000008008100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000000000003f100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 775.155309][ T3111] Unknown options in mask d87b [ 775.239727][ T3110] XFS (loop3): Mounting V4 Filesystem [ 775.292818][ T3110] XFS (loop3): empty log check failed [ 775.320942][ T3110] XFS (loop3): log mount/recovery failed: error -5 10:07:54 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000040100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 775.391581][ T3110] XFS (loop3): log mount failed [ 775.440882][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 775.447187][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 775.453126][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 775.458938][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 775.760986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 775.766964][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) connect$unix(r2, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000480)={0x0, {0x2, 0x4e21, @empty}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @local}, 0x1, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)='veth1\x00', 0x8001, 0x4, 0x200}) r3 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000006000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c00bd5c5bc79b0f616c36d766b29c6fe79100000000000000000015000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d3000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000028007000000070000000a0000000434f4e4e535bce516553c71efa000000827900040000009e00000000000000000800"/569]}, 0x2b1) 10:07:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000fffffff6100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:55 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x200011c0) 10:07:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000fffffdfc100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000040)={0x800, 0x3}) [ 776.248943][ T3177] XFS (loop3): Mounting V4 Filesystem [ 776.307480][ T3177] XFS (loop3): empty log check failed [ 776.320929][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 776.326857][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 776.327320][ T3177] XFS (loop3): log mount/recovery failed: error -5 10:07:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000fffffffe100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 776.451147][ T3177] XFS (loop3): log mount failed 10:07:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\b', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 776.522543][ T3206] Unknown options in mask d87b [ 776.540701][ T3210] Unknown options in mask d87b 10:07:55 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000000000ff100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x9, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) 10:07:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmmsg$sock(r0, &(0x7f0000002e00)=[{{&(0x7f0000000000)=@nfc={0x27, 0x1, 0x2, 0x6}, 0x80, &(0x7f0000001700)=[{&(0x7f00000000c0)="5c8234d3fa514c4fdfd90c3d920698eebf202d86918995bb3d0be6f9d55516f32607ecb6a82389852a5704acf2e39676eb00ad94d74e3f8bacec3bfb22bd2d25f05727ec6ddc1dbc1c192f2b3756ee1ed8f5c9cd75f353599e3797e11889201ca7b31613ef17b3a3c80717e43f03ea74f9a73edb03011a2f08827c0d6ae315f1a359e34f1c32bc915d28f110bfe18af6e09a7a24d595b1c247396f1f7f8b8a32e6eee284f51b521ed7419d6039edd669348ab0c4f5578d0f25fd6e6f8de1c0c6fdc7a7d6b4e915d84ae1fd10479202ef02810ba8866c6a9e3ee025ae0f4d5e957279cf6d87dd0ed4d0a33d71a5557d", 0xef}, {&(0x7f0000000240)="f2db248938e13fa7407aacbb482736d438e10693951c95e7f08c692026657b3128668120b79b6f2834e723a99f2818258d903c14462619cdac236cd8c241e32767a1ae8b670dcc5d1ae48f3f3812383787c16b19f4f7d16f082d691c082e9bf9fb4f105058c9a80858bfa470a5058dc16efb47985d6060010b47a0a25529b915c13b30090434a356dadbda9c8fb03a46bd4f7acdbe778ad01d8c6ed61aec5755f55337ad0185c7c151e096e1da2155c73507a7d0b5536a9ecd8ad6040f8d5235", 0xc0}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000000300)}, {&(0x7f0000000340)="86578e0f6bc89eca59c1f8d29fe0c590987d61dae4abd9c4", 0x18}, {&(0x7f0000000380)="7e93189ab605f5144c1eb08bc51da5d91578c435", 0x14}, {&(0x7f00000003c0)="e5b57dae3102fe0bdf5c25d80862b57dc1e113bf7106ad3213a80bf6d4b966e3b96cc29a79597de5b23606bf2500c65ed4d3180f7bd37c1c79311b1d33acff51da6b4ea0835cec07d6d49773b8173daf2ba2f8e279c8e7f9890a865e03ce95893e222b8f79acc4d624bf4920f7d0aabfd92926a8eb32ce98643cf446b4f88ea384d2bc34861d7717d51e0cefeab54fc1adb8349c9f4698dab262eb2e7d9f2aafb6dc5401b67bfad7f8de266d3d95696671f2ff9f64e6ae29f81ea13cac62036717df5a4eca8a4bc16ca6fbc260a18938425f2d32fa5b0c1f30a1e3f792e6f5b4f8363334321cd9b0e15d7e", 0xeb}], 0x7, &(0x7f0000001780)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @timestamping={{0x14, 0x1, 0x25, 0x8000}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x100}}], 0x78}}, {{&(0x7f0000001800)=@llc={0x1a, 0x104, 0x2, 0x20, 0x8, 0x4}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001880)="4040fc9f5d328b48ffb269e0bbc89b8efa9d23c515dcf92936585741c9f4e042b14419b7cbb94e3d802f0664a7e0d5335c587ecf29fdb5821e4350814ce770ff958ce28d1e9b1f096f7a88cd13691086e83c72939a53ac9edc71224c7290734222eca14fc9cb73954c28e0824eb05ae99ebe5564b8e176fefb8ff90350f4ec324eb78c4797f3c7773c98e45d6f10aeb7f7997f03b693f395007edd96aefddfa2dbe19e11", 0xa4}, {&(0x7f0000001940)="ad7f35d78b095810072c0ac7a8354cf2007d258fd67c146f036df3cb399da27fb88c705df6cb1a445e545b", 0x2b}, {&(0x7f0000001980)="7246fb9b55ce281f2068111a88addff064d6009a0906ea911ac3ee491b42cedc0bcf8c4425de9ad9377aee91b726cc3d14c7146df049ddb2e749808405d0941dbf0c6ff3d876c23bcf472fa6955429bb292917dac11d74e7a20a5906e6b4d9a2b06eccecb132046f863cfb0c65ba334cebdec9418f49fdb35f907cf56a464970d808e2a4e9d406b2c5a016450e3d39f16e26c4ae58459f69ecc18f605598a1a0a437c135cf85cd8a2484f25c", 0xac}, {&(0x7f0000001a40)="14e3836ee17458e0fcd9ff7290518621d1d515f207b645a93493d0f8d7ee6a2ac28fbd193eebb1ab2f123ad4e88fd92cb52ec6e7e205524ea2df761df716bf1669e204279c1c6c28b12f765a31ea93f5e9547fd4b942eb57cec3f96acc91f0c3091e64469b003c7c51183e094ec7ebb0460843314e649351acfec1bfb0a9bccc061e6afcbf3f81eab90ad85de6239d1c80354b", 0x93}, {&(0x7f0000001b00)="0c228d9344c74338a7b8bc00f86bad3bca6c4ddaba2f3f416668fc719bf5d8b6cd732fb1d0ec55f15b74316ca00e8532d31109b0e8610a524b40ecf5913048c58038749404d0bcf209a47bfc2007950ec98fcf4e539bb469d45216ea985d1d06990e944a2e73d3790c645aefe2b7f13b332cad5f58e14bda26ff90ca65a1b231f5a4c86dd994ff73dfa4bdf1df856d8f8358124519b8354981057d6e2e998b", 0x9f}, {&(0x7f0000001bc0)="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", 0x1000}, {&(0x7f0000002bc0)="f51a09fd83b918f8877d04e4cabbfafa1242431727a219580dc00747d3dcb49b449da4", 0x23}, {&(0x7f0000002c00)="0c965238d4c656139389c6a2e9368669571ce802ace77ef226c0addac6e8c8ed1e0f39f53888cba9639b225c097d3909f1a49347f1158e9739b539905396cf8e6559a4d2f4d67dc9c399f2cd46794cd546034b2cde273f24d2ac398779ce4495e5a9b17b1f83e89baaafaa91a6f764eda3987124d019e3acae02b5826285eab1e58946eca4b27f6b8df88bcb466e1e26e0dcf1dfe134d1dd4c51764950a191d97c458e", 0xa3}], 0x8, &(0x7f0000002d40)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0xffff}}, @timestamping={{0x14, 0x1, 0x25, 0xc1}}, @mark={{0x14, 0x1, 0x24, 0xfffffffffffffffe}}, @mark={{0x14, 0x1, 0x24, 0xff}}, @txtime={{0x18, 0x1, 0x3d, 0x80}}], 0xa8}}], 0x2, 0x8800) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000004280), &(0x7f00000042c0)=0x4) r1 = socket(0xa, 0x2, 0x0) r2 = geteuid() mount$9p_virtio(&(0x7f0000004300)='@ppp1%%vmnet1\x00', &(0x7f0000004340)='./file0\x00', &(0x7f0000004380)='9p\x00', 0x0, &(0x7f00000043c0)={'trans=virtio,', {[{@noextend='noextend'}, {@aname={'aname'}}], [{@fowner_lt={'fowner<', r2}}, {@pcr={'pcr', 0x3d, 0x6}}]}}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) sendmsg$alg(r1, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000002e80)="bf2863fe1e76e257ed5637e58e2e6e6267b14d15cdc8a3f1168163e74db41ca1f360c092b287c3130f8c14e4e8f730b4751029743b7bd0a6543c51b139a767edfc8b984bdd9cb54a6787fa395cb06eee19a39b4ad1a91d99a26c4d43ec11816a", 0x60}, {&(0x7f0000002f00)="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", 0x1000}, {&(0x7f0000003f00)="c4a31d14116659561ee5ed291865f03036808aa300a47b92bd07c5331a5509c20d381ecb6fa3bcbfaa8f4011747b58df66f3c08ed532142e8ead1c7bfdcae8c4d2d78838c13410e129dcf6cc9c744b624767bd4c75ae044bb249cac6050471a9dfdaa028a9e9558f6256f48a3d398211b2dfcedec49663a42cd28d101ed73624d4d82c9008180ae2bd8c7a5e6418fb43ae5193ce538785d3529efaffa8975222da4a7eadab72ce50695e0833ce2ed7e036406e6a1b94603b9c42a3615441ee311278d2576516ea3738a0a3a8970292738fa547b66e6977", 0xd7}], 0x3, &(0x7f0000004000)=[@iv={0xf0, 0x117, 0x2, 0xd5, "7b6bd6627f8da8e9ef224dc12947d593e64eb3cc858cfdb1df4463c632fc51c2a10e6b5ce0bc25563b46df6414836c24a7b3c540174b452797302a1e4803feb60cd88390b4e680996025600e0cac6e29a154b74d320cd1c16bf0dea61e6f40d188fbd94a9b5abb3bac61799c31ca1c5a0064066f97da69c730ea2cfc7b15f02544f6ae8df5d54dc5fba64826266fc7b2dfb7ff8d31ced3dfa650ca358973dd5d8392156cd438626a15ab45acc7c57fffc2ca6db034b0ae0748beb9461cc845c6b544f890c3dc478b8ec5a60a80525c0003a0f016b9"}, @iv={0x50, 0x117, 0x2, 0x3c, "17375c033cb7b54664c00e006159e51af283da8dc493f4f1ca57377eabfe349b0327efeb49c0faa5779d2957699e9afbb6c28932f3ae23b8b5982ddf"}, @iv={0xb0, 0x117, 0x2, 0x95, "116e5f9c651e8f402867c6bd5efba7b8ab91a2e61a76c2289e1aedea2986bcd8d18fc85efde5102a3bdac2c2494fe26340078a0e1145129b41aca6cf5502ef3e94555cdc1b2ee81a1c0a16fc3b7fdc2c2e599881320e32134af0a4befc8d518bd1815f56723f8e30a054d828a98dabeccf21860911e9a52d5615742d2f1798d6f1408d644feb598a1dbba2c438acfc3d769b66fa5a"}, @assoc={0x18, 0x117, 0x4, 0x3}], 0x208}, 0x8805) 10:07:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000fcfdffff100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 10:07:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 777.001177][ T3238] Unknown options in mask d87b [ 777.042267][ T3246] Unknown options in mask d87b 10:07:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:56 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x3, 0xfffffffffffffffd) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000040)=0x1) 10:07:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000f6ffffff100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) read(r0, &(0x7f0000000300)=""/161, 0xad) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000056657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000800000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff012f72000b000000000000000000626f6e6430000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa00000082790000000000000000000000000000080000000000000000000000000000003e29bdd8166a8c4bff62fcde22efbbc601ffa18ea72dce4d5267910650ccb80aea7e5e2ae8abd92eb6a31d0663037b016abee281c77c8d0b72bc5fb32f5ff4b5595c009eb8b3a7c61860c36bf5acb3d753191940000000000000"]}, 0x2fe) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000000)={0x7, 0x0, 0x300f, 0xb67, 0x7fffffff, 0x1ff, 0x1f, 0x1}) 10:07:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) 10:07:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\f', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:56 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000080)) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, &(0x7f00000001c0), 0x1000) 10:07:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000feffffff100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 777.392926][ T3273] XFS (loop3): Mounting V4 Filesystem [ 777.430598][ T3273] XFS (loop3): empty log check failed 10:07:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0), 0x1000) [ 777.501043][ T3273] XFS (loop3): log mount/recovery failed: error -5 [ 777.571980][ T3273] XFS (loop3): log mount failed 10:07:56 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000020000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, 0x0, 0x0) 10:07:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000030000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket(0xa, 0x2, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80, 0x2000) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000040)={0x0, 0xffffffffffff899c, 0x0, 0x80, &(0x7f0000ffa000/0x3000)=nil, 0x3}) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f8e6f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c00000000000000000000000000ff090000000020000000080000000000000000247bd83294aa32804651554555450000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000800000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000001120000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) prctl$PR_GET_FP_MODE(0x2e) 10:07:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000040000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:57 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x20400) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket(0xa, 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000100)={r2, 0x9}) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) 10:07:57 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=""/138}) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000001380)=""/77) ioctl$KVM_RUN(r1, 0xae80, 0x0) read$FUSE(r1, &(0x7f00000001c0), 0x1000) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000100)={0x5, 0xbff, &(0x7f0000001400)="b1fa9993ff63ec9c60dd0587f58e31f3701f17629d37181b9b4702fa7487b975276af333d777dfb4207220ca94ea581ddc87048e800ef276639ea96ff1f8eeba6edd22daf511b7ea5f1dbfbca313d3fee0234e65e37a1d798f8513601944a142597bb4a2da38019e5a23540651b6aa2ef748dea3fd401de57c47f2ad8e225576b1f9cd307d919fa3e40cabb6bdfb4be3a518aa69cae376cc7db349d667d457b67337008bb9572b08380593c4954b8828a9fc9294fc00000000000000", &(0x7f0000001300)="e3257cab21726298f6837b829988bf90eecde6181e4742a97d82999c502b7b3b88d7d0ca2eaebc585863c37b6932d5f96830162c5e25f769d723ac908ac5f1ca870c4f5c6ea868b67e6704864d1ca7b8949975090d2f9056bc1e5c16e43aca818de3b52109d4ecfa42259214c404a8968075fb850249f06eb4eec920", 0xbc, 0x7c}) 10:07:57 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000050000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x18', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 778.554799][ T3354] XFS (loop3): Mounting V4 Filesystem [ 778.566618][ T3361] Unknown options in mask d87b [ 778.596827][ T3354] XFS (loop3): empty log check failed [ 778.605769][ T3354] XFS (loop3): log mount/recovery failed: error -5 10:07:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, 0x0, 0x0) [ 778.661012][ T3374] Unknown options in mask d87b [ 778.681879][ T3354] XFS (loop3): log mount failed 10:07:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000040)={0xfffffffffffffff8, 0x0, 0x9}) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000060000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 778.976653][ T3391] Unknown options in mask d87b 10:07:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000070000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x117, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r3, 0xffff}}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e0630000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff000000000000000000000000000400000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e642ff8000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71eda0000008279000000000000000000000000000008000000000000000000000000000000add7015d381eb651be0f2ddada79e70dab34c6297761b50bba36e5bdfb33dad8ce343b5c79f4f669eba86480f2e2f9991fa828535a601768ddd2e96407dac7a60f261c5900d9f0bacb3ca6126136a2fc189d752ffd4b819474d86e7ef1d0efd473e7687d200cfc2617f3e5aed4d91672900000000000"]}, 0x319) 10:07:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000080000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f0000000000)="c0dca5055e0bcfec7be070d1f840b5dbfc188fef1e933f18ea224a47a957bf8ef9070fade21486705095cc2bb789") r1 = socket(0xe, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]}, 0x31f) [ 779.424276][ T3410] XFS (loop3): Mounting V4 Filesystem [ 779.463829][ T3410] XFS (loop3): empty log check failed 10:07:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000300100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:58 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x642, 0x10001, 0x3b4, 0x1}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484b49128ec2b5452bdc27a419b8241106c01aae7de4afa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000001240)) getsockname(r1, &(0x7f00000011c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000080)=0x80) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000100)={r2, 0x1, 0x6, @random="5f158cf92782"}, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040)=0x5, 0x4) read$FUSE(r1, &(0x7f00000001c0), 0x1000) fcntl$getown(r1, 0x9) 10:07:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xa4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 779.477877][ T3410] XFS (loop3): log mount/recovery failed: error -5 [ 779.571152][ T3410] XFS (loop3): log mount failed 10:07:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r2, 0x0, 0x0) 10:07:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x841, 0x1) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x9}, 0x8) r3 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000004000000076657468305f746f5f7465616d0000132e1d02aaaabb000000000000aaaaaaaabcbb0000000000000000d0000000d000000000010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000200040000892f0700636f6e6e6c6162656c0000000000000000000000000000090000000020000000080000000000000000247bd83294aa3280465155455545000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000004000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000000000000000626f6e643000000000000000000000007465616d300000000000000000000000626f6e6430000000000000000020000076657468315f746f5f62726964676500aaaaaaaaaabb000000000000ffffffffffff00000008000000007000000070000000a0000000434f4e4e535bce516553c71efa000000827900000000000000000000000000000800"/560]}, 0x2a8) 10:07:58 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000500100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 779.820092][ T3446] Unknown options in mask d87b [ 779.860140][ T3452] Unknown options in mask d87b [ 779.920933][ C0] net_ratelimit: 20 callbacks suppressed [ 779.920942][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 779.932533][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:07:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000600100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xdc', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@broute={'broute\x00', 0x20, 0x2, 0x230, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/560]}, 0x2a8) ppoll(&(0x7f0000000000)=[{r0, 0x1000}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x8) 10:07:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000700100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 780.392794][ T3476] Unknown options in mask d87b 10:07:59 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) socket$rxrpc(0x21, 0x2, 0xa) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) [ 780.480894][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 780.487398][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 780.560899][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 780.566783][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:07:59 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000003f00100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:07:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$describe(0x6, r0, &(0x7f0000001240)=""/127, 0x7f) [ 780.737929][ T3487] XFS (loop3): Mounting V4 Filesystem [ 780.780530][ T3487] XFS (loop3): empty log check failed [ 780.789499][ T3487] XFS (loop3): log mount/recovery failed: error -5 10:08:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000004000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 780.921739][ T3487] XFS (loop3): log mount failed 10:08:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x20, r1, 0x201, 0x0, 0x0, {0x11}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x5}]}]}, 0x20}}, 0x0) [ 781.041015][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 781.047928][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:08:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000000000ff00100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 781.155319][ T3522] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 781.225069][ T3527] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 10:08:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs@', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000004be41c0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)=""/41, 0x29}, {0x0}, {0x0, 0x240}], 0x3, 0x0, 0x5d}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000140)=""/192, 0xc0}, {0x0}, {0x0, 0x235}, {0x0, 0x7a}], 0x4}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) readv(r1, &(0x7f0000000840)=[{&(0x7f0000001c80)=""/251, 0xfb}], 0x1) shutdown(r4, 0x0) shutdown(r1, 0x0) 10:08:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ptype\x00') preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000780)=""/106, 0x6a}, {&(0x7f0000000300)=""/202, 0xca}, {&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/89, 0x59}], 0x4, 0x49) 10:08:00 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) open_by_handle_at(r0, &(0x7f00000011c0)={0xa9, 0x6, "e8c7f4aca24e10791322362e8dff66ace20cc551c2d268d9212d43df85cee294e70559af015e30256559608f3654de256ff6e476a57c97052fc07b5472c328b4b0f7b7e15081ee8370abb96eac87452e7e96fb6bdc0ba34a6cfa4873917ced1a16a35a30cc17c3d327dc437c22a8bd2e0beb9623203a393d5869be014fc534e117391f0c26b051b9b78c60f2a68c53b32c74d00db3f1199e31dcd874b731c60fd6"}, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:08:00 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000200000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:00 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) poll(&(0x7f0000000080)=[{r0, 0x2}], 0x1, 0x0) poll(&(0x7f0000000040), 0x2000000000000033, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x10101, 0x0, 0x0, 0x800e008c0) shutdown(r1, 0x0) [ 781.601881][ T3544] XFS (loop3): Mounting V4 Filesystem 10:08:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 781.663612][ T3544] XFS (loop3): empty log check failed [ 781.680875][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 781.686795][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 781.692628][ T3544] XFS (loop3): log mount/recovery failed: error -5 10:08:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000000000002f0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='coredump_filter\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") preadv(r0, &(0x7f0000001640)=[{&(0x7f0000000040)=""/59, 0x1}], 0x1, 0x0) [ 781.821084][ T3544] XFS (loop3): log mount failed 10:08:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000fa0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) 10:08:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x94', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:01 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2284, &(0x7f00000002c0)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 10:08:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000ff0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:01 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001740)='/dev/btrfs-control\x00', 0x490000, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000001840)={0xa8, &(0x7f0000001780)="2ccc76753d7a0e1f817e4a978ba29f46d82651a639bb2f58534ed99096646f497e6e99d29c1679712664d400b1bb41c79c89235b4407eff339eaba8cd67352b49cf2c4b8c2f60e6ff37375c40c0dd525d153354e8dbfc6b00bb88315bebc6d979270d7467209f0999117d05eb7efd940266505bd03fbcbed8ad39c9d308e6889bde90bb0e25497be8c00804d094db0a793d7aeb7dc94acb91246cb70a5eafc95c8a21927e3ec99e0"}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000001400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x201}, 0xc, &(0x7f00000013c0)={&(0x7f00000011c0)={0x1f8, r3, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xba30}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x23}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1fc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdac}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x40}, 0x0) r4 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f00000015c0)={0x200, {{0xa, 0x4e21, 0x36b, @local, 0x683}}}, 0x88) ioctl$sock_ax25_SIOCADDRT(r4, 0x890b, &(0x7f0000001440)={@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl$SG_SET_FORCE_PACK_ID(r4, 0x227b, &(0x7f0000000000)=0x1) open_tree(r4, &(0x7f0000001700)='./file0\x00', 0x8100) openat$mixer(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/mixer\x00', 0x80000, 0x0) read$FUSE(r4, &(0x7f00000001c0), 0x1000) openat$mixer(0xffffffffffffff9c, &(0x7f0000001680)='/dev/mixer\x00', 0x0, 0x0) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f00000014c0)={'ip6gretap0\x00', 0x2, 0x866}) 10:08:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000500)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_SET_SOCK(r0, 0xab08, 0xffffffffffffffff) 10:08:01 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000200100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x9c', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 782.913099][ T3624] block nbd0: NBD_DISCONNECT [ 782.943340][ T3624] block nbd0: Send disconnect failed -107 [ 782.970542][ T3618] XFS (loop3): Mounting V4 Filesystem [ 783.024321][ T3618] XFS (loop3): empty log check failed [ 783.057175][ T3618] XFS (loop3): log mount/recovery failed: error -5 [ 783.064751][ T3622] block nbd0: Disconnected due to user request. 10:08:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000300100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 783.078024][ T3622] block nbd0: shutting down sockets [ 783.131556][ T3618] XFS (loop3): log mount failed [ 783.146125][ T3624] block nbd0: NBD_DISCONNECT [ 783.171125][ T3624] block nbd0: Send disconnect failed -107 [ 783.221771][ T3622] block nbd0: Disconnected due to user request. [ 783.261460][ T3622] block nbd0: shutting down sockets 10:08:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xa0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:02 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000400100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x1, 0x0, @pic={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x8}) 10:08:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xcc', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:03 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x800, 0x0) ioctl$PPPIOCSMRU1(r0, 0x40047452, &(0x7f0000000080)=0x3f) r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r2 = dup(r1) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000000)=0x1) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000001200)={0x34, 0x0, &(0x7f00000011c0)}) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ffd000/0x2000)=nil) read$FUSE(r2, &(0x7f00000001c0), 0x1000) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video1\x00', 0x2, 0x0) 10:08:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000500100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)=""/41, 0x29}, {0x0}], 0x2}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000140)=""/192, 0xc0}, {0x0}, {0x0, 0x235}, {0x0, 0x7a}], 0x4}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) readv(r1, &(0x7f0000000840)=[{&(0x7f0000001c80)=""/251, 0xfb}, {0x0}], 0x2) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 783.926470][ T3668] XFS (loop3): Mounting V4 Filesystem [ 784.002208][ T3668] XFS (loop3): empty log check failed [ 784.040990][ T3668] XFS (loop3): log mount/recovery failed: error -5 10:08:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000600100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe6', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 784.141065][ T3668] XFS (loop3): log mount failed 10:08:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000700100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:03 executing program 5: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, 0x0) 10:08:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:03 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000800100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000040)="d5772c660fa2fc1ad67759fbfa12a0b3a8f3063d0fda14a72961cce8083b5f485ae303107a334e14622b6e5a5ea222506354e5112d51d72b0df34342c7dadaef864853bd1635a499e5c6c5221fe059fced569df14ed206663e0963836655e5fc5cf22ccd2fc5c13d3a3488bee4", 0x6d) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000100)={{0xffffffffffffffff, 0x2, 0x9, 0x3, 0x7}}) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:08:04 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x2, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev={0xac, 0x70}}}}}}}, 0x0) 10:08:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000003100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsN', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:04 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000005100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:04 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa7]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)="a674867ae1356e708a7c3bc472c0af38fced35dc9812e35d", 0x18}], 0x1) [ 785.090569][ T3743] XFS (loop3): Mounting V4 Filesystem [ 785.162747][ T3743] XFS (loop3): empty log check failed [ 785.191071][ T3743] XFS (loop3): log mount/recovery failed: error -5 [ 785.200950][ C0] net_ratelimit: 20 callbacks suppressed [ 785.200959][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.212569][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.271240][ T3743] XFS (loop3): log mount failed [ 785.461145][ T3774] input: syz1 as /devices/virtual/input/input12 [ 785.517765][ T3776] input: syz1 as /devices/virtual/input/input13 [ 785.840928][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.846774][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.852705][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.858476][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:08:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000006100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsp', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @pic={0x0, 0x6c11, 0x0, 0x3, 0xb0e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x241bb472}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:08:05 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x12c) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:08:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000007100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 786.160877][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 786.166733][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:08:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="584653420000100000000000003f100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x8c', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000780)={0x1, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @pic={0x0, 0x6c11, 0x0, 0x3, 0xb0e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x241bb472}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 786.358446][ T3814] XFS (loop3): Mounting V4 Filesystem [ 786.404879][ T3814] XFS (loop3): empty log check failed [ 786.431672][ T3814] XFS (loop3): log mount/recovery failed: error -5 [ 786.532562][ T3814] XFS (loop3): log mount failed 10:08:05 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000040100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 786.720921][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 786.726831][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:08:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000000000ff100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x94', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000002100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000100)={@multicast2, @dev, 0x0}, &(0x7f0000001240)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000001280)={@mcast2, 0x79, r2}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) fstatfs(r1, &(0x7f0000000080)=""/5) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000011c0)={0x5, 0xf, 0x4, 0x20000000, {r3, r4/1000+30000}, {0x5, 0x8, 0x80000001, 0x6, 0x9, 0x800, "78e32b1c"}, 0x81, 0x7, @fd=r1, 0x4}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={r1, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:08:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:06 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, 0x0) 10:08:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000003100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x9e', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:06 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x406, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00000000c0)=""/85, 0x321) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000080)={r4, 0x0, 0x1d}, &(0x7f0000000240)=ANY=[@ANYBLOB="656e633d6f61657020686173683d6e68706f6c7931333035000000000000000000000000000000001900"/59], 0x0, &(0x7f0000000140)=""/29) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000180), 0x8) syz_open_dev$usbmon(0x0, 0x0, 0x101000) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)={0x1, [0x0]}, 0x0) 10:08:06 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000004100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 787.493134][ T3873] XFS (loop3): Mounting V4 Filesystem [ 787.567992][ T3873] XFS (loop3): empty log check failed [ 787.588172][ T3873] XFS (loop3): log mount/recovery failed: error -5 10:08:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 787.670979][ T3873] XFS (loop3): log mount failed 10:08:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000005100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc8', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x2, 0x800) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) fcntl$setstatus(r1, 0x4, 0x4000) 10:08:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000006100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000007100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) bind$packet(r1, &(0x7f00000011c0)={0x11, 0x8, r2, 0x1, 0x80000001, 0x6, @broadcast}, 0x14) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:08:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xd4', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 788.515411][ T3929] XFS (loop3): Mounting V4 Filesystem [ 788.558948][ T3929] XFS (loop3): empty log check failed [ 788.590407][ T3929] XFS (loop3): log mount/recovery failed: error -5 10:08:07 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004080)=[{&(0x7f0000002b80)=@abs, 0x6e, 0x0, 0x264}], 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0xfdef) 10:08:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:07 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000008100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 788.701182][ T3929] XFS (loop3): log mount failed 10:08:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xdc', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c4dc00025e0b01047be070") r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) fallocate(r1, 0x11, 0x0, 0xc00000) 10:08:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000200000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000009500000000000000"], 0x0, 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 10:08:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000000000002f0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:08 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)) read$FUSE(r1, &(0x7f00000001c0), 0x1000) 10:08:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioperm(0x2, 0xb638, 0xa06) 10:08:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:08 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000fa0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 789.612271][ T3995] XFS (loop3): Mounting V4 Filesystem 10:08:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)=""/41, 0x29}, {0x0}], 0x2}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000140)=""/192, 0xc0}, {0x0}, {0x0, 0x235}, {0x0, 0x7a}], 0x4}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) readv(r1, &(0x7f0000000840)=[{&(0x7f0000001c80)=""/251, 0xfb}], 0x1) shutdown(r4, 0x0) shutdown(r1, 0x0) 10:08:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 789.697551][ T3995] XFS (loop3): empty log check failed [ 789.733641][ T3995] XFS (loop3): log mount/recovery failed: error -5 [ 789.813297][ T4009] XFS (loop4): Mounting V4 Filesystem [ 789.841058][ T3995] XFS (loop3): log mount failed 10:08:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000ff0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 789.870594][ T4009] XFS (loop4): empty log check failed [ 789.885824][ T4009] XFS (loop4): log mount/recovery failed: error -5 [ 789.971145][ T4009] XFS (loop4): log mount failed 10:08:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000000000002f0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5ee5d0bcfff") [ 790.320862][ C0] net_ratelimit: 20 callbacks suppressed [ 790.320871][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.326626][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:08:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000fa0000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000040)) ioctl$NBD_CLEAR_QUE(r1, 0xab05) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='/dev/sg#\x00', r1}, 0x10) r2 = gettid() sched_setparam(r2, &(0x7f00000011c0)=0x81) read$FUSE(r1, &(0x7f00000001c0), 0x1067) 10:08:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs0', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:09 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0xf5ffffff00000000, @loopback}, 0x1c) 10:08:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:08:09 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="58465342000010000000000000001ce44b000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 790.702160][ T4056] XFS (loop3): Mounting V4 Filesystem [ 790.778147][ T4056] XFS (loop3): empty log check failed [ 790.811981][ T4056] XFS (loop3): log mount/recovery failed: error -5 [ 790.880915][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.886908][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.911077][ T4056] XFS (loop3): log mount failed 10:08:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100200000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 790.960864][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 790.966745][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:08:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfsZ', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:08:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100300000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 791.441006][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 791.446981][ C0] protocol 88fb is buggy, dev hsr_slave_1 10:08:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:10 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100400000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) r1 = dup(r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140)="dd7217ec171bef7514e824ec7642098f5dd80f7ca95b8de9710aedec8ca3c0d18ecefc597a687a38259d218ae3746545d7d1c4b52c8e484349128ec2b5232bdc27a419b8241106c01aae7decafa68e8b96d0dc98e62c7a19a90f08fe832871cc33961a56a6b4b26ebfc648b0d2bd1fbc097bc505f9362f70c07fe58b5b067ee7a2b8fefe60e61ca6", 0x0}, 0x18) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000000)=0x1) read$FUSE(r1, &(0x7f00000011c0), 0xffffff27) 10:08:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) read(r0, &(0x7f0000000200)=""/164, 0xa4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x2ec, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0xd, &(0x7f0000000000)={@remote, @broadcast}, 0x8) recvfrom$inet(r1, 0x0, 0x10000002c, 0x0, 0x0, 0x800e0054e) shutdown(r1, 0x0) 10:08:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 791.773737][ T4107] XFS (loop3): Mounting V4 Filesystem [ 791.829941][ T4107] XFS (loop3): empty log check failed [ 791.848563][ T4107] XFS (loop3): log mount/recovery failed: error -5 10:08:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100500000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 791.981301][ T4107] XFS (loop3): log mount failed 10:08:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc6', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:11 executing program 1: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100600000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:08:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000580)={0x1, 0x0, @pic={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe5, 0x1}}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 792.080909][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 792.086869][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 792.500307][ T4107] XFS (loop3): Mounting V4 Filesystem [ 792.551516][ T4107] ================================================================== [ 792.560016][ T4107] BUG: KASAN: use-after-free in xlog_alloc_log+0x1266/0x1380 [ 792.567408][ T4107] Read of size 8 at addr ffff8880a1d03b90 by task syz-executor.3/4107 [ 792.575562][ T4107] [ 792.577913][ T4107] CPU: 1 PID: 4107 Comm: syz-executor.3 Not tainted 5.2.0-rc6-next-20190627 #24 [ 792.586945][ T4107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.598903][ T4107] Call Trace: [ 792.602216][ T4107] dump_stack+0x172/0x1f0 [ 792.606575][ T4107] ? xlog_alloc_log+0x1266/0x1380 [ 792.611623][ T4107] print_address_description.cold+0xd4/0x306 [ 792.617623][ T4107] ? xlog_alloc_log+0x1266/0x1380 [ 792.622666][ T4107] ? xlog_alloc_log+0x1266/0x1380 [ 792.627718][ T4107] __kasan_report.cold+0x1b/0x36 [ 792.632671][ T4107] ? kvfree+0x50/0x70 [ 792.636675][ T4107] ? xlog_alloc_log+0x1266/0x1380 [ 792.641724][ T4107] kasan_report+0x12/0x17 [ 792.646067][ T4107] __asan_report_load8_noabort+0x14/0x20 [ 792.651715][ T4107] xlog_alloc_log+0x1266/0x1380 [ 792.656682][ T4107] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 792.662968][ T4107] xfs_log_mount+0xdc/0x780 [ 792.667500][ T4107] xfs_mountfs+0xdb9/0x1be0 [ 792.672186][ T4107] ? xfs_default_resblks+0x60/0x60 [ 792.677325][ T4107] ? init_timer_key+0x13b/0x3a0 [ 792.682208][ T4107] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 792.687919][ T4107] ? xfs_filestream_get_ag+0x60/0x60 [ 792.693258][ T4107] xfs_fs_fill_super+0xcca/0x16e0 [ 792.698307][ T4107] mount_bdev+0x304/0x3c0 [ 792.702657][ T4107] ? xfs_test_remount_options+0x90/0x90 [ 792.708230][ T4107] xfs_fs_mount+0x35/0x40 [ 792.712576][ T4107] ? xfs_finish_flags+0x490/0x490 [ 792.717661][ T4107] legacy_get_tree+0x108/0x220 [ 792.722447][ T4107] ? legacy_parse_monolithic+0x11f/0x180 [ 792.728105][ T4107] vfs_get_tree+0x8e/0x390 [ 792.732551][ T4107] do_mount+0x138c/0x1c00 [ 792.736902][ T4107] ? copy_mount_string+0x40/0x40 [ 792.741869][ T4107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 792.748212][ T4107] ? copy_mount_options+0x2e8/0x3f0 [ 792.754423][ T4107] ksys_mount+0xdb/0x150 [ 792.758696][ T4107] __x64_sys_mount+0xbe/0x150 [ 792.763401][ T4107] do_syscall_64+0xfd/0x6a0 [ 792.767936][ T4107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.773844][ T4107] RIP: 0033:0x45bf6a [ 792.777754][ T4107] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 792.797378][ T4107] RSP: 002b:00007fba25360a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 792.805815][ T4107] RAX: ffffffffffffffda RBX: 00007fba25360b40 RCX: 000000000045bf6a [ 792.813801][ T4107] RDX: 00007fba25360ae0 RSI: 0000000020000000 RDI: 00007fba25360b00 [ 792.821790][ T4107] RBP: 0000000000000001 R08: 00007fba25360b40 R09: 00007fba25360ae0 [ 792.829771][ T4107] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 792.837847][ T4107] R13: 00000000004c858e R14: 00000000004df0e0 R15: 00000000ffffffff [ 792.845872][ T4107] [ 792.848221][ T4107] Allocated by task 4107: [ 792.852568][ T4107] save_stack+0x23/0x90 [ 792.856735][ T4107] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 792.863524][ T4107] kasan_kmalloc+0x9/0x10 [ 792.867861][ T4107] __kmalloc+0x163/0x770 [ 792.872118][ T4107] kmem_alloc+0xd2/0x200 [ 792.876375][ T4107] xlog_alloc_log+0xbf4/0x1380 [ 792.881161][ T4107] xfs_log_mount+0xdc/0x780 [ 792.885671][ T4107] xfs_mountfs+0xdb9/0x1be0 [ 792.890268][ T4107] xfs_fs_fill_super+0xcca/0x16e0 [ 792.895315][ T4107] mount_bdev+0x304/0x3c0 [ 792.899950][ T4107] xfs_fs_mount+0x35/0x40 [ 792.904306][ T4107] legacy_get_tree+0x108/0x220 [ 792.909083][ T4107] vfs_get_tree+0x8e/0x390 [ 792.913516][ T4107] do_mount+0x138c/0x1c00 [ 792.917853][ T4107] ksys_mount+0xdb/0x150 [ 792.922108][ T4107] __x64_sys_mount+0xbe/0x150 [ 792.926800][ T4107] do_syscall_64+0xfd/0x6a0 [ 792.931321][ T4107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.937212][ T4107] [ 792.939556][ T4107] Freed by task 4107: [ 792.943560][ T4107] save_stack+0x23/0x90 [ 792.947725][ T4107] __kasan_slab_free+0x102/0x150 [ 792.952675][ T4107] kasan_slab_free+0xe/0x10 [ 792.957188][ T4107] kfree+0x10a/0x2c0 [ 792.961102][ T4107] kvfree+0x61/0x70 [ 792.964931][ T4107] xlog_alloc_log+0xea9/0x1380 [ 792.969713][ T4107] xfs_log_mount+0xdc/0x780 [ 792.974253][ T4107] xfs_mountfs+0xdb9/0x1be0 [ 792.978767][ T4107] xfs_fs_fill_super+0xcca/0x16e0 [ 792.983807][ T4107] mount_bdev+0x304/0x3c0 [ 792.988148][ T4107] xfs_fs_mount+0x35/0x40 [ 792.992502][ T4107] legacy_get_tree+0x108/0x220 [ 792.997277][ T4107] vfs_get_tree+0x8e/0x390 [ 793.001707][ T4107] do_mount+0x138c/0x1c00 [ 793.006049][ T4107] ksys_mount+0xdb/0x150 [ 793.010302][ T4107] __x64_sys_mount+0xbe/0x150 [ 793.014994][ T4107] do_syscall_64+0xfd/0x6a0 [ 793.019515][ T4107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.025425][ T4107] [ 793.027760][ T4107] The buggy address belongs to the object at ffff8880a1d03b00 [ 793.027760][ T4107] which belongs to the cache kmalloc-1k of size 1024 [ 793.041919][ T4107] The buggy address is located 144 bytes inside of [ 793.041919][ T4107] 1024-byte region [ffff8880a1d03b00, ffff8880a1d03f00) [ 793.055378][ T4107] The buggy address belongs to the page: [ 793.061066][ T4107] page:ffffea0002874080 refcount:1 mapcount:0 mapping:ffff8880aa400c40 index:0x0 compound_mapcount: 0 [ 793.072157][ T4107] flags: 0x1fffc0000010200(slab|head) [ 793.077648][ T4107] raw: 01fffc0000010200 ffffea0002938888 ffffea00022f3088 ffff8880aa400c40 [ 793.086410][ T4107] raw: 0000000000000000 ffff8880a1d02000 0000000100000007 0000000000000000 [ 793.095034][ T4107] page dumped because: kasan: bad access detected [ 793.101464][ T4107] [ 793.103801][ T4107] Memory state around the buggy address: [ 793.109451][ T4107] ffff8880a1d03a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 793.117746][ T4107] ffff8880a1d03b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 793.125840][ T4107] >ffff8880a1d03b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 793.133922][ T4107] ^ [ 793.138619][ T4107] ffff8880a1d03c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 793.146699][ T4107] ffff8880a1d03c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 793.154776][ T4107] ================================================================== [ 793.162936][ T4107] Disabling lock debugging due to kernel taint [ 793.175836][ T4107] Kernel panic - not syncing: panic_on_warn set ... [ 793.177959][ T3879] kobject: 'loop2' (00000000f9c73d78): kobject_uevent_env [ 793.182458][ T4107] CPU: 1 PID: 4107 Comm: syz-executor.3 Tainted: G B 5.2.0-rc6-next-20190627 #24 [ 793.182466][ T4107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.182471][ T4107] Call Trace: [ 793.182493][ T4107] dump_stack+0x172/0x1f0 [ 793.182514][ T4107] panic+0x2dc/0x755 [ 793.182528][ T4107] ? add_taint.cold+0x16/0x16 [ 793.182544][ T4107] ? xlog_alloc_log+0x1266/0x1380 [ 793.182567][ T4107] ? preempt_schedule+0x4b/0x60 [ 793.236132][ T4107] ? ___preempt_schedule+0x16/0x18 [ 793.241269][ T4107] ? trace_hardirqs_on+0x5e/0x240 [ 793.246401][ T4107] ? xlog_alloc_log+0x1266/0x1380 [ 793.251445][ T4107] end_report+0x47/0x4f [ 793.255716][ T4107] ? xlog_alloc_log+0x1266/0x1380 [ 793.260971][ T4107] __kasan_report.cold+0xe/0x36 [ 793.265824][ T4107] ? kvfree+0x50/0x70 [ 793.269824][ T4107] ? xlog_alloc_log+0x1266/0x1380 [ 793.274862][ T4107] kasan_report+0x12/0x17 [ 793.279200][ T4107] __asan_report_load8_noabort+0x14/0x20 [ 793.284848][ T4107] xlog_alloc_log+0x1266/0x1380 [ 793.290064][ T4107] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 793.296322][ T4107] xfs_log_mount+0xdc/0x780 [ 793.300880][ T4107] xfs_mountfs+0xdb9/0x1be0 [ 793.305401][ T4107] ? xfs_default_resblks+0x60/0x60 [ 793.310519][ T4107] ? init_timer_key+0x13b/0x3a0 [ 793.315420][ T4107] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 793.320803][ T4107] ? xfs_filestream_get_ag+0x60/0x60 [ 793.326097][ T4107] xfs_fs_fill_super+0xcca/0x16e0 [ 793.331126][ T4107] mount_bdev+0x304/0x3c0 [ 793.335453][ T4107] ? xfs_test_remount_options+0x90/0x90 [ 793.341354][ T4107] xfs_fs_mount+0x35/0x40 [ 793.345693][ T4107] ? xfs_finish_flags+0x490/0x490 [ 793.350717][ T4107] legacy_get_tree+0x108/0x220 [ 793.355487][ T4107] ? legacy_parse_monolithic+0x11f/0x180 [ 793.361139][ T4107] vfs_get_tree+0x8e/0x390 [ 793.365557][ T4107] do_mount+0x138c/0x1c00 [ 793.369890][ T4107] ? copy_mount_string+0x40/0x40 [ 793.374854][ T4107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 793.381112][ T4107] ? copy_mount_options+0x2e8/0x3f0 [ 793.386426][ T4107] ksys_mount+0xdb/0x150 [ 793.390673][ T4107] __x64_sys_mount+0xbe/0x150 [ 793.395412][ T4107] do_syscall_64+0xfd/0x6a0 [ 793.399928][ T4107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.405903][ T4107] RIP: 0033:0x45bf6a [ 793.409799][ T4107] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 793.429416][ T4107] RSP: 002b:00007fba25360a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 793.437861][ T4107] RAX: ffffffffffffffda RBX: 00007fba25360b40 RCX: 000000000045bf6a [ 793.445838][ T4107] RDX: 00007fba25360ae0 RSI: 0000000020000000 RDI: 00007fba25360b00 [ 793.453924][ T4107] RBP: 0000000000000001 R08: 00007fba25360b40 R09: 00007fba25360ae0 [ 793.461903][ T4107] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 793.469874][ T4107] R13: 00000000004c858e R14: 00000000004df0e0 R15: 00000000ffffffff [ 793.479343][ T4107] Kernel Offset: disabled [ 793.485522][ T4107] Rebooting in 86400 seconds..