xecuting program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) [ 337.626341][T12033] XFS (loop0): Mounting V4 Filesystem [ 337.676694][T12033] XFS (loop0): empty log check failed [ 337.685853][T12033] XFS (loop0): log mount/recovery failed: error -5 [ 337.732099][T12033] XFS (loop0): log mount failed 10:24:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:24:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x4f, 0x0) 10:24:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:53 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'user.', 'securityvboxnet0\x00'}, &(0x7f0000000380)='xfs\x00', 0x4, 0x2) getresuid(0x0, &(0x7f0000000200), 0x0) r0 = open(0x0, 0x40c2, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r0, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(r0, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:24:53 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, 0xffffffffffffffff, 0x0) 10:24:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x50, 0x0) 10:24:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:53 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r0, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:53 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, 0xffffffffffffffff, 0x0) 10:24:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x51, 0x0) 10:24:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 338.585818][T12105] XFS (loop0): Mounting V4 Filesystem [ 338.621059][T12105] XFS (loop0): empty log check failed 10:24:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x52, 0x0) [ 338.631076][T12105] XFS (loop0): log mount/recovery failed: error -5 10:24:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:24:54 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, 0xffffffffffffffff, 0x0) 10:24:54 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r0, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) [ 338.782996][T12105] XFS (loop0): log mount failed 10:24:54 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, r1, 0x0) 10:24:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x53, 0x0) 10:24:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:54 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'user.', 'securityvboxnet0\x00'}, &(0x7f0000000380)='xfs\x00', 0x4, 0x2) getresuid(0x0, &(0x7f0000000200), 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:24:54 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, r1, 0x0) 10:24:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x54, 0x0) 10:24:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:24:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:24:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:55 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, r1, 0x0) 10:24:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 340.005230][T12166] XFS (loop0): Mounting V4 Filesystem [ 340.039865][T12166] XFS (loop0): empty log check failed 10:24:55 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000fe8)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) getsockopt$inet6_tcp_int(r3, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r3, 0x800c5012, &(0x7f0000000040)) dup3(r1, r0, 0x0) [ 340.052002][T12166] XFS (loop0): log mount/recovery failed: error -5 10:24:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x55, 0x0) [ 340.121916][T12166] XFS (loop0): log mount failed 10:24:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x56, 0x0) 10:24:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:55 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'user.', 'securityvboxnet0\x00'}, &(0x7f0000000380)='xfs\x00', 0x4, 0x2) getresuid(0x0, &(0x7f0000000200), 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:24:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x57, 0x0) 10:24:55 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000fe8)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) getsockopt$inet6_tcp_int(r3, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r3, 0x800c5012, &(0x7f0000000040)) dup3(r1, r0, 0x0) 10:24:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:24:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:24:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:56 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000fe8)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) getsockopt$inet6_tcp_int(r3, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r3, 0x800c5012, &(0x7f0000000040)) dup3(r1, r0, 0x0) 10:24:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x58, 0x0) 10:24:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:24:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x59, 0x0) [ 340.992702][T12252] XFS (loop0): Mounting V4 Filesystem [ 341.030711][T12252] XFS (loop0): empty log check failed [ 341.040590][T12252] XFS (loop0): log mount/recovery failed: error -5 10:24:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x5a, 0x0) [ 341.102107][T12252] XFS (loop0): log mount failed 10:24:56 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, r1, 0x0) 10:24:56 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'user.', 'securityvboxnet0\x00'}, &(0x7f0000000380)='xfs\x00', 0x4, 0x2) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:24:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x5b, 0x0) 10:24:56 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, r1, 0x0) 10:24:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:24:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:24:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x5c, 0x0) 10:24:56 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, r1, 0x0) 10:24:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:24:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) [ 341.922151][T12308] XFS (loop0): Mounting V4 Filesystem 10:24:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:24:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x5d, 0x0) [ 342.037265][T12308] XFS (loop0): empty log check failed [ 342.072115][T12308] XFS (loop0): log mount/recovery failed: error -5 [ 342.134951][T12308] XFS (loop0): log mount failed 10:24:57 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:24:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:24:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x5e, 0x0) 10:24:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:24:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:24:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x5f, 0x0) 10:24:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 342.940813][T12366] XFS (loop0): Mounting V4 Filesystem 10:24:58 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) [ 342.981517][T12366] XFS (loop0): empty log check failed [ 342.990015][T12366] XFS (loop0): log mount/recovery failed: error -5 10:24:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x60, 0x0) [ 343.062520][T12366] XFS (loop0): log mount failed 10:24:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:58 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:24:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x61, 0x0) 10:24:58 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:24:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:24:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:24:59 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:24:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x62, 0x0) 10:24:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:24:59 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:24:59 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) [ 344.102582][T12429] XFS (loop0): Mounting V4 Filesystem 10:24:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x63, 0x0) [ 344.230459][T12429] XFS (loop0): empty log check failed 10:24:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) [ 344.341802][T12429] XFS (loop0): log mount/recovery failed: error -5 [ 344.422644][T12429] XFS (loop0): log mount failed 10:25:00 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:00 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x64, 0x0) 10:25:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00'}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:25:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x65, 0x0) 10:25:00 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x0, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) [ 345.402977][T12484] XFS (loop0): Mounting V4 Filesystem [ 345.441514][T12484] XFS (loop0): empty log check failed [ 345.462112][T12484] XFS (loop0): log mount/recovery failed: error -5 10:25:00 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x66, 0x0) [ 345.581901][T12484] XFS (loop0): log mount failed 10:25:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x67, 0x0) 10:25:01 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:01 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x68, 0x0) 10:25:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:25:01 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x69, 0x0) 10:25:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x6a, 0x0) [ 346.542724][T12539] XFS (loop0): Mounting V4 Filesystem 10:25:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x0, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x6b, 0x0) 10:25:02 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) [ 346.664756][T12539] XFS (loop0): empty log check failed [ 346.678317][T12539] XFS (loop0): log mount/recovery failed: error -5 10:25:02 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 346.765944][T12539] XFS (loop0): log mount failed 10:25:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x6c, 0x0) 10:25:02 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x6d, 0x0) 10:25:02 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x6e, 0x0) 10:25:02 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, r1, 0x0) [ 347.527097][T12604] XFS (loop0): Mounting V4 Filesystem 10:25:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x6f, 0x0) [ 347.571846][T12604] XFS (loop0): empty log check failed [ 347.577913][T12604] XFS (loop0): log mount/recovery failed: error -5 [ 347.652085][T12604] XFS (loop0): log mount failed 10:25:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x0, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:03 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, r1, 0x0) 10:25:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x70, 0x0) 10:25:03 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x71, 0x0) 10:25:03 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r2, r1, 0x0) 10:25:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x72, 0x0) 10:25:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 348.385050][T12640] XFS (loop0): Mounting V4 Filesystem [ 348.469798][T12640] XFS (loop0): empty log check failed [ 348.484068][T12640] XFS (loop0): log mount/recovery failed: error -5 10:25:03 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x73, 0x0) [ 348.632142][T12640] XFS (loop0): log mount failed 10:25:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, 0x0) io_submit(0x0, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x74, 0x0) 10:25:04 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:04 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:04 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x75, 0x0) 10:25:04 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:25:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x76, 0x0) [ 349.467644][T12698] XFS (loop0): Mounting V4 Filesystem 10:25:04 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x77, 0x0) [ 349.534170][T12698] XFS (loop0): empty log check failed [ 349.539880][T12698] XFS (loop0): log mount/recovery failed: error -5 [ 349.602129][T12698] XFS (loop0): log mount failed 10:25:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x78, 0x0) 10:25:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, 0x0) io_submit(0x0, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x79, 0x0) 10:25:05 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:05 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:25:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:05 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:05 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:05 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:05 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:25:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x7a, 0x0) 10:25:05 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) [ 350.378560][T12752] XFS (loop0): Mounting V4 Filesystem [ 350.436453][T12752] XFS (loop0): empty log check failed [ 350.442501][T12752] XFS (loop0): log mount/recovery failed: error -5 [ 350.502226][T12752] XFS (loop0): log mount failed 10:25:05 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, 0x0) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, 0x0) io_submit(0x0, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:06 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x7b, 0x0) 10:25:06 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:06 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:06 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:06 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:06 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x7c, 0x0) [ 351.227636][T12807] XFS (loop0): Mounting V4 Filesystem [ 351.256229][T12807] XFS (loop0): empty log check failed [ 351.266938][T12807] XFS (loop0): log mount/recovery failed: error -5 [ 351.352540][T12807] XFS (loop0): log mount failed 10:25:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x7d, 0x0) 10:25:07 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)) io_submit(0x0, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x7e, 0x0) 10:25:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:07 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:07 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:07 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x82, 0x0) [ 352.335854][T12860] XFS (loop0): Mounting V4 Filesystem 10:25:07 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x83, 0x0) [ 352.437515][T12860] XFS (loop0): empty log check failed [ 352.475553][T12860] XFS (loop0): log mount/recovery failed: error -5 10:25:07 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:07 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) [ 352.571932][T12860] XFS (loop0): log mount failed 10:25:08 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x84, 0x0) 10:25:08 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)) io_submit(0x0, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:08 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:08 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:08 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x85, 0x0) 10:25:08 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x86, 0x0) 10:25:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:08 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) [ 353.477913][T12927] XFS (loop0): Mounting V4 Filesystem [ 353.521315][T12927] XFS (loop0): empty log check failed [ 353.542553][T12927] XFS (loop0): log mount/recovery failed: error -5 [ 353.652020][T12927] XFS (loop0): log mount failed 10:25:09 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x87, 0x0) 10:25:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)) io_submit(0x0, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:09 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x88, 0x0) 10:25:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:09 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:09 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x89, 0x0) [ 354.623812][T12977] XFS (loop0): Mounting V4 Filesystem [ 354.659647][T12977] XFS (loop0): empty log check failed [ 354.665509][T12977] XFS (loop0): log mount/recovery failed: error -5 10:25:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x8a, 0x0) [ 354.731966][T12977] XFS (loop0): log mount failed 10:25:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x8b, 0x0) 10:25:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x8c, 0x0) 10:25:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:10 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:10 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x8d, 0x0) 10:25:10 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:10 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x8e, 0x0) [ 355.511100][T13029] XFS (loop0): Mounting V4 Filesystem [ 355.642094][T13029] XFS (loop0): empty log check failed [ 355.647571][T13029] XFS (loop0): log mount/recovery failed: error -5 10:25:11 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x8f, 0x0) [ 355.771924][T13029] XFS (loop0): log mount failed 10:25:11 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x90, 0x0) 10:25:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r2 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r2, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:11 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:11 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x91, 0x0) 10:25:11 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:11 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x0, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:11 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x92, 0x0) 10:25:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:12 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x0, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x93, 0x0) 10:25:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x94, 0x0) [ 356.703760][T13093] XFS (loop0): Mounting V4 Filesystem 10:25:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r2 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r2, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x95, 0x0) [ 356.832035][T13093] XFS (loop0): empty log check failed [ 356.882734][T13093] XFS (loop0): log mount/recovery failed: error -5 10:25:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 357.056241][T13093] XFS (loop0): log mount failed 10:25:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x96, 0x0) 10:25:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:12 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x0, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x97, 0x0) 10:25:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:12 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x98, 0x0) 10:25:12 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r2 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r2, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x99, 0x0) [ 357.892493][T13152] XFS (loop0): Mounting V4 Filesystem 10:25:13 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) [ 358.095466][T13152] XFS (loop0): empty log check failed [ 358.111892][T13152] XFS (loop0): log mount/recovery failed: error -5 10:25:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 358.172143][T13152] XFS (loop0): log mount failed 10:25:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x9a, 0x0) 10:25:13 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:13 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:13 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x0, &(0x7f0000000bc0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x9b, 0x0) 10:25:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:14 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x9c, 0x0) 10:25:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:14 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x9d, 0x0) [ 359.078988][T13207] XFS (loop0): Mounting V4 Filesystem [ 359.160283][T13207] XFS (loop0): empty log check failed [ 359.191846][T13207] XFS (loop0): log mount/recovery failed: error -5 10:25:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 359.286189][T13207] XFS (loop0): log mount failed 10:25:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x9e, 0x0) 10:25:14 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x0, &(0x7f0000000bc0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:14 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x9f, 0x0) 10:25:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:15 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa0, 0x0) 10:25:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:15 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x10, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa1, 0x0) 10:25:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:15 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa2, 0x0) 10:25:15 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) [ 360.608226][T13266] XFS (loop0): Mounting V4 Filesystem 10:25:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 360.708248][T13266] XFS (loop0): empty log check failed [ 360.771900][T13266] XFS (loop0): log mount/recovery failed: error -5 10:25:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x0, &(0x7f0000000bc0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa3, 0x0) [ 360.888618][T13266] XFS (loop0): log mount failed 10:25:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:16 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:16 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa4, 0x0) 10:25:16 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, &(0x7f0000000040)) dup3(r3, r2, 0x0) 10:25:16 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa5, 0x0) 10:25:16 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, 0x0) dup3(r3, r2, 0x0) 10:25:17 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000bc0)=[0x0]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:17 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, 0x0) dup3(r3, r2, 0x0) 10:25:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa6, 0x0) [ 361.834183][T13338] XFS (loop0): Mounting V4 Filesystem 10:25:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa7, 0x0) [ 362.004927][T13338] XFS (loop0): empty log check failed [ 362.018105][T13338] XFS (loop0): log mount/recovery failed: error -5 [ 362.152091][T13338] XFS (loop0): log mount failed 10:25:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:17 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, 0x0) dup3(r3, r2, 0x0) 10:25:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa8, 0x0) 10:25:17 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xa9, 0x0) 10:25:18 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(0xffffffffffffffff, r2, 0x0) 10:25:18 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000bc0)=[0x0]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) [ 362.823880][T13397] XFS (loop0): Mounting V4 Filesystem 10:25:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xaa, 0x0) [ 362.910366][T13397] XFS (loop0): empty log check failed [ 362.949848][T13397] XFS (loop0): log mount/recovery failed: error -5 10:25:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xab, 0x0) [ 363.081883][T13397] XFS (loop0): log mount failed 10:25:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xac, 0x0) 10:25:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:18 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xad, 0x0) 10:25:18 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xae, 0x0) 10:25:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:19 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(0xffffffffffffffff, r2, 0x0) 10:25:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xaf, 0x0) 10:25:19 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000bc0)=[0x0]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb0, 0x0) 10:25:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb1, 0x0) [ 364.040894][T13452] XFS (loop0): Mounting V4 Filesystem [ 364.139853][T13452] XFS (loop0): empty log check failed [ 364.161040][T13452] XFS (loop0): log mount/recovery failed: error -5 10:25:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb2, 0x0) [ 364.193970][T13452] XFS (loop0): log mount failed 10:25:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:19 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb3, 0x0) 10:25:20 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) getsockopt$inet6_tcp_int(r4, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r4, 0x800c5012, &(0x7f0000000040)) dup3(0xffffffffffffffff, r2, 0x0) 10:25:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb4, 0x0) 10:25:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb5, 0x0) 10:25:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 365.260740][T13515] XFS (loop0): Mounting V4 Filesystem 10:25:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb6, 0x0) [ 365.456426][T13515] XFS (loop0): empty log check failed [ 365.465639][T13515] XFS (loop0): log mount/recovery failed: error -5 [ 365.521937][T13515] XFS (loop0): log mount failed 10:25:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb7, 0x0) 10:25:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:21 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, 0xffffffffffffffff, 0x0) 10:25:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb8, 0x0) 10:25:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xb9, 0x0) 10:25:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xba, 0x0) 10:25:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 366.367564][T13574] XFS (loop0): Mounting V4 Filesystem [ 366.433321][T13574] XFS (loop0): empty log check failed [ 366.445015][T13574] XFS (loop0): log mount/recovery failed: error -5 [ 366.503657][T13574] XFS (loop0): log mount failed 10:25:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xbb, 0x0) 10:25:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xbc, 0x0) 10:25:22 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, 0xffffffffffffffff, 0x0) 10:25:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xbd, 0x0) 10:25:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xbe, 0x0) 10:25:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 367.349496][T13631] XFS (loop0): Mounting V4 Filesystem 10:25:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xbf, 0x0) [ 367.476096][T13631] XFS (loop0): empty log check failed [ 367.511555][T13631] XFS (loop0): log mount/recovery failed: error -5 10:25:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) [ 367.611986][T13631] XFS (loop0): log mount failed 10:25:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc0, 0x0) 10:25:23 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000fe8)) r3 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup(r4) getsockopt$inet6_tcp_int(r5, 0x6, 0x1, 0x0, &(0x7f0000012ffc)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r5, 0x800c5012, &(0x7f0000000040)) dup3(r3, 0xffffffffffffffff, 0x0) 10:25:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc1, 0x0) 10:25:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc2, 0x0) 10:25:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc3, 0x0) 10:25:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 368.613167][T13692] XFS (loop0): Mounting V4 Filesystem 10:25:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc4, 0x0) [ 368.696911][T13692] XFS (loop0): empty log check failed 10:25:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc5, 0x0) [ 368.762944][T13692] XFS (loop0): log mount/recovery failed: error -5 [ 368.851882][T13692] XFS (loop0): log mount failed 10:25:24 executing program 4: mknod(&(0x7f00000001c0)='./file0\x00', 0x200001040, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 10:25:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc6, 0x0) 10:25:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc7, 0x0) 10:25:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:24 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$inet_tcp(0x2, 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007140)=[{{&(0x7f0000001340)=@nl=@unspec, 0x80, 0x0, 0x0, 0x0, 0xfffffea0}}], 0x400015d, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) pipe2(&(0x7f0000000000), 0x0) writev(0xffffffffffffffff, &(0x7f0000001980)=[{0x0}], 0x1) 10:25:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:24 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc8, 0x0) 10:25:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:25 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\x96\xf7\t\b\x00\x00@\xe54\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov=ie\xf3x\xfe[\x90\xe0\xaft\xafi\xd9\xb2\x96ef\x98XL\xe5\xb0\xc6\xac\xcb\x19\xf2\xba25v\xb2-\xc7g\tM\x04_R\x93\x1be\x8f\xacGxWc\xee[\xc0\xe6\xdc\xcc\x8dT[\x85\xb4\xa4@\t\xb3\x1f\b\x9c\xf9\x8d\x9d\x92YJ$\x89\xaa\xcfQ[?`\xf4\xfeg\xd6\xd9`Hpc\xdc@7N\xf4\xee\xfdQ\x1b\t\x00\x00\x00\xfcJ\x7fKC\xa1[\xe4\xc8f|\xe9\xef|\x1b\xf0d\xf0\x89\x1aM\x8b\xc3I&)\xc1\x8a\xc6\x11\x84&3\x02\x88\x97\xb7\xe3[E\x90\x95=\x8e7\x90\xa8,\x16~\x17\xa1m\xf4F\xfb\x05\x82\x05\'1Q\xe5s\x8f\x13\xfe\xd3Zw\xf4e\xb9*\xcdgBa\xac\x83\xf8\xb9\xf0\xcc\"\xb4\xf4\xa7\'\x98\x1fg@\xbe|\xa72\xbf\vb\xc8y\x9b{\xfc?\x87\x9e\x16\'\'\xbe\xe6B\x9c\x01k\xe1\xa8\\\n\xcd.\xc14O\n\xd1\x14,\xc5\xa1\x1e\x9a\x03jUr\xca\xdb\x88C\x96\xd1\b+,\x8b\x8fTj\x80\'Q\x14\xa9\'L\x85c\x84P\xb1\xe6#\xba\x11+\xd9~\x13\xd44j\xed\x9b2\xc2\xdcT;\x9e\xa0\xe7\xb2\xf8\xf2\xd5\x96\xbe \xfci\xb9\xfa\x11\a\x15\xeb>rK\xaf\x1e\xcf\x1aI\xceM\x82v\xdd\xe4\xc4\xd1M8\xd9;\xb5\x14@K\x81\xcc\x02x\xc9]e\x96\xd57\be\xe5\x89\x9e\xefs\xe3U\xc7\xa1\xdf\x95\xe1\xf3\x0fM\x87\xb3\xd2)\v@w\x9f2\xbd\x8b!\xa2\xd4gv\xb5s\xf8\xc4\xdb\x87\x95dV\x9bc\xa3\a\x16\xba\xe9m/\x8a\x83\x9c\x84\xbes\xf6\xa4\xfb\xe09\xa6p\xcd\xd4*\xccF\xca\x1e\xacC!x\n!{\xc5oE\x00\xc2\xf6\x1f\xcf]\x891') socket$inet_udp(0x2, 0x2, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x10000) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="04f00f0505c8f0e6f30f3471"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 369.773820][T13783] ptrace attach of "/root/syz-executor.4"[13780] was attempted by "/root/syz-executor.4"[13783] [ 369.847967][T13759] XFS (loop0): Mounting V4 Filesystem [ 369.903716][T13792] ptrace attach of "/root/syz-executor.4"[13791] was attempted by "/root/syz-executor.4"[13792] [ 369.979957][T13759] XFS (loop0): empty log check failed 10:25:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xc9, 0x0) 10:25:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 370.033479][T13759] XFS (loop0): log mount/recovery failed: error -5 10:25:25 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="dfc2cd80"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="442a9f022cb3529ca0a30b2b8bf1335de564fc593426fd2f717d6ac30eef2f843622a92f7d2959ecd3025144d8eb574721d78ac0fb72db70408570cfba7ea76d75dfb78e22b70a87dfa1b14938be21cf54ecbc3004d76dd512c96ffa52a6229f", @ANYRES64, @ANYRES32], 0x0, 0x6c}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 370.112185][T13759] XFS (loop0): log mount failed 10:25:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xca, 0x0) 10:25:25 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) execve(0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) r1 = dup(r0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syncfs(r1) fdatasync(0xffffffffffffffff) [ 370.264137][T13808] ptrace attach of "/root/syz-executor.4"[13806] was attempted by "/root/syz-executor.4"[13808] 10:25:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:25 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xcb, 0x0) 10:25:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) socket$nl_route(0x10, 0x3, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 10:25:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xcc, 0x0) 10:25:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xcd, 0x0) [ 371.068295][T13834] XFS (loop0): Mounting V4 Filesystem [ 371.169507][T13834] XFS (loop0): empty log check failed [ 371.194114][T13834] XFS (loop0): log mount/recovery failed: error -5 10:25:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 371.332059][T13834] XFS (loop0): log mount failed 10:25:26 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xce, 0x0) 10:25:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:26 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xcf, 0x0) 10:25:27 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x14, &(0x7f0000000080)=0x1000000000002ecb, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000469ffc)=0x100000000007fd, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) recvfrom(r1, 0x0, 0x0, 0x2041, &(0x7f0000000700)=@sco, 0x71d000) 10:25:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd0, 0x0) [ 372.144213][T13900] XFS (loop0): Mounting V4 Filesystem 10:25:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:27 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000600)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\x96\xf7\t\b\x00\x00@\xe54\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov=ie\xf3x\xfe[\x90\xe0\xaft\xafi\xd9\xb2\x96ef\x98XL\xe5\xb0\xc6\xac\xcb\x19\xf2\xba25v\xb2-\xc7g\tM\x04_R\x93\x1be\x8f\xacGxWc\xee[\xc0\xe6\xdc\xcc\x8dT[\x85\xb4\xa4@\t\xb3\x1f\b\x9c\xf9\x8d\x9d\x92YJ$\x89\xaa\xcfQ[?`\xf4\xfeg\xd6\xd9`Hpc\xdc@7N\xf4\xee\xfdQ\x1b\t\x00\x00\x00\xfcJ\x7fKC\xa1[\xe4\xc8f|\xe9\xef|\x1b\xf0d\xf0\x89\x1aM\x8b\xc3I&)\xc1\x8a\xc6\x11\x84&3\x02\x88\x97\xb7\xe3[E\x90\x95=\x8e7\x90\xa8,\x16~\x17\xa1m\xf4F\xfb\x05\x82\x05\'1Q\xe5s\x8f\x13\xfe\xd3Zw\xf4e\xb9*\xcdgBa\xac\x83\xf8\xb9\xf0\xcc\"\xb4\xf4\xa7\'\x98\x1fg@\xbe|\xa72\xbf\vb\xc8y\x9b{\xfc?\x87\x9e\x16\'\'\xbe\xe6B\x9c\x01k\xe1\xa8\\\n\xcd.\xc14O\n\xd1\x14,\xc5\xa1\x1e\x9a\x03jUr\xca\xdb\x88C\x96\xd1\b+,\x8b\x8fTj\x80\'Q\x14\xa9\'L\x85c\x84P\xb1\xe6#\xba\x11+\xd9~\x13\xd44j\xed\x9b2\xc2\xdcT;\x9e\xa0\xe7\xb2\xf8\xf2\xd5\x96\xbe \xfci\xb9\xfa\x11\a\x15\xeb>rK\xaf\x1e\xcf\x1aI\xceM\x82v\xdd\xe4\xc4\xd1M8\xd9;\xb5\x14@K\x81\xcc\x02x\xc9]e\x96\xd57\be\xe5\x89\x9e\xefs\xe3U\xc7\xa1\xdf\x95\xe1\xf3\x0fM\x87\xb3\xd2)\v@w\x9f2\xbd\x8b!\xa2\xd4gv\xb5s\xf8\xc4\xdb\x87\x95dV\x9bc\xa3\a\x16\xba\xe9m/\x8a\x83\x9c\x84\xbes\xf6\xa4\xfb\xe09\xa6p\xcd\xd4*\xccF\xca\x1e\xacC!x\n!{\xc5oE\x00\xc2\xf6\x1f\xcf]\x891') socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x10000) r1 = syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="04f00f0505c8f0e6f30f3471"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 10:25:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd1, 0x0) [ 372.202409][T13900] XFS (loop0): empty log check failed [ 372.207919][T13900] XFS (loop0): log mount/recovery failed: error -5 10:25:27 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd2, 0x0) [ 372.337137][T13900] XFS (loop0): log mount failed [ 372.358220][T13928] ptrace attach of "/root/syz-executor.4"[13926] was attempted by "/root/syz-executor.4"[13928] 10:25:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) 10:25:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x8012, r2, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000100)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000016c0)=@gcm_128={{}, "c3afb5b81a00", "b06d0b56242cfb8b405ed63baf900d2e", "557c0200", "7fd9d095d047fcc1"}, 0x28) 10:25:27 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) [ 372.621364][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 372.666827][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 10:25:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd3, 0x0) 10:25:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:25:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 373.098367][T13965] XFS (loop0): Mounting V4 Filesystem [ 373.147711][T13965] XFS (loop0): empty log check failed [ 373.159170][T13965] XFS (loop0): log mount/recovery failed: error -5 [ 373.211767][T13965] XFS (loop0): log mount failed 10:25:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd4, 0x0) 10:25:28 executing program 4: syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x0) r0 = memfd_create(0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) read$eventfd(r1, 0x0, 0x0) fallocate(r0, 0x800000000000003, 0xfa9, 0x0) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r3 = msgget$private(0x0, 0x1) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000002c0)=""/106) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = dup(r4) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) waitid(0x0, 0x0, &(0x7f0000000180), 0x41000003, 0x0) timer_create(0x5, &(0x7f0000000080)={0x0, 0x3c}, &(0x7f0000000100)) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x832}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20980, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x800fe) stat(&(0x7f0000000400)='./bus\x00', &(0x7f0000000480)) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="3313d00418d4bc9af7098d30d78da65798ab9c74c4111661df283e62e96caf36af7bd044a9cd6e7ef1654fbfdb1aaafb783e6849fa6e73a4631c9d90ef5b6781629631cec233a3", @ANYRES16, @ANYBLOB="000828bd700075f50c000300070000001000000008000100100001007564703a73797a310000000014e29dea3e000840020006000000"], 0x3}, 0x1, 0x0, 0x0, 0x2004c840}, 0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) 10:25:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:25:28 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd5, 0x0) [ 373.466761][T13989] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:25:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:25:29 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd6, 0x0) 10:25:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 10:25:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd7, 0x0) 10:25:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd8, 0x0) [ 374.069816][T14016] XFS (loop0): Mounting V4 Filesystem [ 374.106977][T14016] XFS (loop0): empty log check failed [ 374.107171][T14016] XFS (loop0): log mount/recovery failed: error -5 [ 374.152006][T14016] XFS (loop0): log mount failed [ 374.196875][ T23] audit: type=1800 audit(1575368729.554:45): pid=13998 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=17095 res=0 10:25:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:30 executing program 4: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttynull\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x5414, &(0x7f0000000240)) 10:25:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xd9, 0x0) 10:25:30 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x29, 0x0, @remote={0xfe, 0x80, [0x3, 0x543, 0x700, 0x5, 0x50000000000000d, 0x8848000000f0ffff], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x7, 0x11], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0x3, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, 0x0, 0x0, 0x5]}, @mcast2={0x11, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb]}}}}}}}}, 0x0) 10:25:30 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:30 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000000005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000800000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000000000"], 0xb8}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 10:25:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xda, 0x0) 10:25:30 executing program 4: mq_unlink(&(0x7f0000000000)='system\x00') 10:25:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xdb, 0x0) 10:25:30 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0xffef) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x2) [ 375.266465][T14063] XFS (loop0): Mounting V4 Filesystem 10:25:30 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xdc, 0x0) [ 375.328806][T14063] XFS (loop0): empty log check failed [ 375.328880][T14063] XFS (loop0): log mount/recovery failed: error -5 [ 375.435369][T14063] XFS (loop0): log mount failed 10:25:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:31 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0xffef) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x2) 10:25:31 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xdd, 0x0) 10:25:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:31 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:31 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000000005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000800000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000000000"], 0xb8}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 10:25:31 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xde, 0x0) 10:25:31 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0xffef) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x2) 10:25:31 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xdf, 0x0) 10:25:31 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0xffef) r2 = accept4(r0, 0x0, 0x0, 0x0) shutdown(r2, 0x2) [ 376.375754][T14121] XFS (loop0): Mounting V4 Filesystem [ 376.433773][T14121] XFS (loop0): empty log check failed [ 376.433896][T14121] XFS (loop0): log mount/recovery failed: error -5 10:25:31 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe0, 0x0) [ 376.491322][T14121] XFS (loop0): log mount failed 10:25:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe1, 0x0) 10:25:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:32 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[], 0xffef) accept4(r0, 0x0, 0x0, 0x0) 10:25:32 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe2, 0x0) 10:25:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:32 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000000005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000800000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000000000"], 0xb8}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 10:25:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe3, 0x0) 10:25:32 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:32 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe4, 0x0) 10:25:32 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) 10:25:33 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) 10:25:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe5, 0x0) [ 377.606635][T14178] XFS (loop0): Mounting V4 Filesystem [ 377.704949][T14178] XFS (loop0): empty log check failed [ 377.705051][T14178] XFS (loop0): log mount/recovery failed: error -5 [ 377.781998][T14178] XFS (loop0): log mount failed 10:25:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe6, 0x0) 10:25:33 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(r0, 0x0, 0x0, 0x0) 10:25:33 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, 0x0}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:33 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000000005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000800000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000000000"], 0xb8}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) 10:25:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe7, 0x0) 10:25:33 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe8, 0x0) 10:25:34 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xe9, 0x0) [ 378.749337][T14227] XFS (loop0): Mounting V4 Filesystem 10:25:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xea, 0x0) 10:25:34 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) [ 378.883483][T14227] XFS (loop0): empty log check failed [ 378.932301][T14227] XFS (loop0): log mount/recovery failed: error -5 [ 379.042495][T14227] XFS (loop0): log mount failed 10:25:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x0, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xeb, 0x0) 10:25:34 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:34 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x40000004, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:25:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, 0x0}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:35 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xec, 0x0) 10:25:35 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00(\xb6u\x86S\xca\xe6\x12n)`\xaa\xa6|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) creat(&(0x7f00001d3ff4)='./file0/bus\x00', 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:25:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xed, 0x0) 10:25:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xee, 0x0) [ 379.935226][T14288] XFS (loop0): Mounting V4 Filesystem [ 380.010436][T14288] XFS (loop0): empty log check failed [ 380.010588][T14288] XFS (loop0): log mount/recovery failed: error -5 [ 380.096758][T14288] XFS (loop0): log mount failed 10:25:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xef, 0x0) 10:25:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x0, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:36 executing program 1: syz_open_dev$midi(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 10:25:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf0, 0x0) 10:25:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, 0x0}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:36 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:36 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf1, 0x0) 10:25:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf2, 0x0) 10:25:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf3, 0x0) 10:25:36 executing program 1: syz_open_dev$midi(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 10:25:36 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf4, 0x0) [ 381.213702][T14347] XFS (loop0): Mounting V4 Filesystem 10:25:36 executing program 1: syz_open_dev$midi(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) [ 381.287853][T14347] XFS (loop0): empty log check failed [ 381.320843][T14347] XFS (loop0): log mount/recovery failed: error -5 [ 381.422224][T14347] XFS (loop0): log mount failed 10:25:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x0, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf5, 0x0) 10:25:37 executing program 1: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') ftruncate(0xffffffffffffffff, 0x7) creat(&(0x7f00000001c0)='./file0\x00', 0x10) futimesat(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) sendto$inet(r2, 0x0, 0x0, 0xc860e17cbf55624f, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000000240), 0x45483d5a560d7693, 0x0, &(0x7f0000002a80)={0x0, r3+30000000}) socket$key(0xf, 0x3, 0x2) socket(0x10, 0x400000000080803, 0x0) socket(0x10, 0x400000000080803, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'bond0\x00'}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x21, &(0x7f0000002340)) write(0xffffffffffffffff, 0x0, 0x0) 10:25:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:37 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf6, 0x0) 10:25:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf7, 0x0) 10:25:37 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf8, 0x0) [ 382.303723][T14408] XFS (loop0): Mounting V4 Filesystem [ 382.355627][T14408] XFS (loop0): empty log check failed 10:25:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xf9, 0x0) [ 382.355721][T14408] XFS (loop0): log mount/recovery failed: error -5 [ 382.421904][T14408] XFS (loop0): log mount failed 10:25:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xfa, 0x0) 10:25:38 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, 0x0) 10:25:38 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xfb, 0x0) 10:25:38 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f0000c3c000/0x4000)=nil, 0x4000}, 0x200000}) 10:25:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xfc, 0x0) [ 383.238398][T14451] XFS (loop0): Mounting V4 Filesystem 10:25:38 executing program 1: [ 383.311437][T14451] XFS (loop0): empty log check failed [ 383.342030][T14451] XFS (loop0): log mount/recovery failed: error -5 10:25:38 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:38 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xfd, 0x0) 10:25:38 executing program 1: [ 383.452060][T14451] XFS (loop0): log mount failed 10:25:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0xfe, 0x0) [ 384.073521][T14505] XFS (loop0): Mounting V4 Filesystem [ 384.114024][T14505] XFS (loop0): empty log check failed [ 384.122648][T14505] XFS (loop0): log mount/recovery failed: error -5 [ 384.161889][T14505] XFS (loop0): log mount failed 10:25:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, 0x0) 10:25:39 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:39 executing program 1: 10:25:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x102, 0x0) 10:25:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:39 executing program 1: 10:25:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x103, 0x0) 10:25:39 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", 0x0]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:39 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x104, 0x0) 10:25:40 executing program 1: 10:25:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x105, 0x0) [ 384.972164][T14544] XFS (loop0): Mounting V4 Filesystem [ 385.018848][T14544] XFS (loop0): empty log check failed [ 385.024594][T14544] XFS (loop0): log mount/recovery failed: error -5 [ 385.082191][T14544] XFS (loop0): log mount failed 10:25:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, 0x0) 10:25:40 executing program 1: 10:25:40 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x106, 0x0) 10:25:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:40 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", 0x0]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:40 executing program 1: 10:25:41 executing program 1: 10:25:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x107, 0x0) 10:25:41 executing program 1: [ 385.696242][T14578] XFS (loop0): Mounting V4 Filesystem [ 385.737575][T14578] XFS (loop0): empty log check failed 10:25:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x108, 0x0) [ 385.737847][T14578] XFS (loop0): log mount/recovery failed: error -5 [ 385.795167][T14578] XFS (loop0): log mount failed 10:25:41 executing program 1: 10:25:42 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:42 executing program 2: 10:25:42 executing program 1: 10:25:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x109, 0x0) 10:25:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", 0x0]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:42 executing program 1: 10:25:42 executing program 2: 10:25:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x10a, 0x0) 10:25:42 executing program 1: 10:25:42 executing program 1: [ 387.143186][T14627] XFS (loop0): Mounting V4 Filesystem 10:25:42 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x10b, 0x0) [ 387.240886][T14627] XFS (loop0): empty log check failed [ 387.261147][T14627] XFS (loop0): log mount/recovery failed: error -5 [ 387.401985][T14627] XFS (loop0): log mount failed 10:25:43 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x4000) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:25:43 executing program 1: 10:25:43 executing program 2: 10:25:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x10c, 0x0) 10:25:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:43 executing program 2: 10:25:43 executing program 1: 10:25:43 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x10d, 0x0) 10:25:43 executing program 1: 10:25:43 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x4000) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 10:25:43 executing program 1: 10:25:43 executing program 2: 10:25:43 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x4000) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 388.112715][T14669] XFS (loop0): Mounting V4 Filesystem 10:25:43 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:43 executing program 2: [ 388.240424][T14669] XFS (loop0): empty log check failed [ 388.240493][T14669] XFS (loop0): log mount/recovery failed: error -5 [ 388.312361][T14669] XFS (loop0): log mount failed 10:25:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x10e, 0x0) 10:25:44 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:44 executing program 1: 10:25:44 executing program 2: 10:25:44 executing program 2: 10:25:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x10f, 0x0) 10:25:44 executing program 2: 10:25:44 executing program 2: [ 388.904493][T14721] XFS (loop0): Mounting V4 Filesystem 10:25:44 executing program 1: 10:25:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x40, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x40}}, 0x0) [ 389.057845][T14721] XFS (loop0): empty log check failed [ 389.075403][T14721] XFS (loop0): log mount/recovery failed: error -5 [ 389.162764][T14721] XFS (loop0): log mount failed 10:25:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:45 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfff7) fallocate(r3, 0x100000003, 0x0, 0x28120007) fallocate(r3, 0x100000003, 0x0, 0x28120007) 10:25:45 executing program 1: syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x104200) 10:25:45 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x110, 0x0) 10:25:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x111, 0x0) [ 389.738843][T14767] XFS (loop0): Mounting V4 Filesystem [ 389.793212][T14767] XFS (loop0): empty log check failed 10:25:45 executing program 1: r0 = socket$packet(0x11, 0x40800000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000140)="1004f00073c1abfc327444f55b42", 0xe, 0x0, 0x0, 0x0) 10:25:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x112, 0x0) [ 389.839007][T14767] XFS (loop0): log mount/recovery failed: error -5 [ 389.902287][T14767] XFS (loop0): log mount failed 10:25:45 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:45 executing program 2: getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket(0x0, 0x0, 0x0) close(0xffffffffffffffff) socket$packet(0x11, 0x0, 0x300) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket(0x0, 0x0, 0x0) 10:25:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x113, 0x0) 10:25:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x114, 0x0) 10:25:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:46 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x115, 0x0) 10:25:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", 0x0]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:46 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", 0x0]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", 0x0]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x116, 0x0) [ 391.046735][T14846] XFS (loop0): Mounting V4 Filesystem [ 391.099328][T14846] XFS (loop0): empty log check failed [ 391.105345][T14846] XFS (loop0): log mount/recovery failed: error -5 [ 391.206911][T14846] XFS (loop0): log mount failed 10:25:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:46 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x117, 0x0) 10:25:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x118, 0x0) 10:25:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:47 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x119, 0x0) [ 391.929379][T14901] XFS (loop0): Mounting V4 Filesystem 10:25:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, 0x0}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x11a, 0x0) [ 392.131207][T14901] XFS (loop0): empty log check failed [ 392.164682][T14901] XFS (loop0): log mount/recovery failed: error -5 [ 392.252286][T14901] XFS (loop0): log mount failed 10:25:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, 0x0}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, 0x0}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:47 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x11b, 0x0) 10:25:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:48 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x11c, 0x0) 10:25:48 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 392.997039][T14957] XFS (loop0): Mounting V4 Filesystem [ 393.035438][T14957] XFS (loop0): empty log check failed [ 393.049237][T14957] XFS (loop0): log mount/recovery failed: error -5 [ 393.121945][T14957] XFS (loop0): log mount failed 10:25:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x11d, 0x0) 10:25:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fc"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:48 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x11e, 0x0) 10:25:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 393.860493][T15008] XFS (loop0): Mounting V4 Filesystem [ 393.935147][T15008] XFS (loop0): empty log check failed [ 393.941946][T15008] XFS (loop0): log mount/recovery failed: error -5 10:25:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x11f, 0x0) [ 394.061924][T15008] XFS (loop0): log mount failed 10:25:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:49 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x120, 0x0) 10:25:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x121, 0x0) 10:25:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fc"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:49 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x122, 0x0) 10:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fc"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x123, 0x0) [ 395.017781][T15063] XFS (loop0): Mounting V4 Filesystem 10:25:50 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x124, 0x0) [ 395.162425][T15063] XFS (loop0): empty log check failed [ 395.168706][T15063] XFS (loop0): log mount/recovery failed: error -5 [ 395.221990][T15063] XFS (loop0): log mount failed 10:25:50 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x125, 0x0) 10:25:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fc"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:51 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x126, 0x0) 10:25:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fc"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 396.088886][T15127] XFS (loop0): Mounting V4 Filesystem 10:25:51 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:51 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x127, 0x0) [ 396.156514][T15127] XFS (loop0): empty log check failed [ 396.189698][T15127] XFS (loop0): log mount/recovery failed: error -5 10:25:51 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 396.252309][T15127] XFS (loop0): log mount failed 10:25:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x128, 0x0) 10:25:52 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x129, 0x0) 10:25:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fc"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 397.038608][T15182] XFS (loop0): Mounting V4 Filesystem [ 397.086778][T15182] XFS (loop0): empty log check failed [ 397.093681][T15182] XFS (loop0): log mount/recovery failed: error -5 [ 397.181994][T15182] XFS (loop0): log mount failed 10:25:52 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:52 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x12a, 0x0) 10:25:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x12b, 0x0) 10:25:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:52 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x12c, 0x0) 10:25:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) [ 397.998077][T15235] XFS (loop0): Mounting V4 Filesystem 10:25:53 executing program 2: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x12d, 0x0) [ 398.099302][T15235] XFS (loop0): empty log check failed [ 398.117984][T15235] XFS (loop0): log mount/recovery failed: error -5 10:25:53 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x12e, 0x0) [ 398.262126][T15235] XFS (loop0): log mount failed 10:25:53 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:53 executing program 2: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:53 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x12f, 0x0) 10:25:54 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff93, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:25:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x130, 0x0) 10:25:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x131, 0x0) [ 399.062597][T15294] XFS (loop0): Mounting V4 Filesystem 10:25:54 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:54 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x132, 0x0) [ 399.219138][T15294] XFS (loop0): empty log check failed [ 399.219297][T15294] XFS (loop0): log mount/recovery failed: error -5 10:25:54 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) [ 399.352759][T15294] XFS (loop0): log mount failed 10:25:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x133, 0x0) 10:25:54 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x134, 0x0) 10:25:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:55 executing program 1: faccessat(0xffffffffffffffff, 0x0, 0x8, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce198c694fc4d5a79f"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x135, 0x0) 10:25:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:55 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x136, 0x0) 10:25:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x2ee6bc40dbce6995}) io_setup(0x0, &(0x7f0000000080)=0x0) io_submit(r1, 0x3e00, &(0x7f0000000bc0)=[&(0x7f00000001c0)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x0, 0x383}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x8914, &(0x7f0000000040)={'eql\x00`\x00\t\x00\x00\x00\x01\x03\x03\xf0\x00', @ifru_addrs=@nfc}) 10:25:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x137, 0x0) [ 400.597987][T15355] XFS (loop0): Mounting V4 Filesystem 10:25:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x138, 0x0) [ 400.697934][T15355] XFS (loop0): empty log check failed [ 400.727465][T15355] XFS (loop0): log mount/recovery failed: error -5 [ 400.812419][T15355] XFS (loop0): log mount failed 10:25:56 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x139, 0x0) 10:25:56 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:56 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x13a, 0x0) 10:25:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x13b, 0x0) 10:25:57 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) [ 402.167289][T15426] XFS (loop0): Mounting V4 Filesystem [ 402.242520][T15426] XFS (loop0): empty log check failed [ 402.248742][T15426] XFS (loop0): log mount/recovery failed: error -5 [ 402.312015][T15426] XFS (loop0): log mount failed 10:25:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x13c, 0x0) 10:25:58 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:25:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x13d, 0x0) 10:25:58 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:58 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x13e, 0x0) 10:25:59 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) [ 403.927816][T15484] XFS (loop0): Mounting V4 Filesystem [ 403.977659][T15484] XFS (loop0): empty log check failed [ 404.031919][T15484] XFS (loop0): log mount/recovery failed: error -5 10:25:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x13f, 0x0) [ 404.091821][T15484] XFS (loop0): log mount failed 10:25:59 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:59 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:25:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x140, 0x0) 10:25:59 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:25:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:26:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x141, 0x0) 10:26:00 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:26:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:26:00 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:26:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x142, 0x0) 10:26:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:00 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) [ 405.426750][T15556] XFS (loop0): Mounting V4 Filesystem 10:26:00 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x143, 0x0) [ 405.558720][T15556] XFS (loop0): empty log check failed [ 405.607080][T15556] XFS (loop0): log mount/recovery failed: error -5 [ 405.750186][T15556] XFS (loop0): log mount failed 10:26:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x144, 0x0) 10:26:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x145, 0x0) 10:26:01 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:26:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce19"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:26:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:26:01 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x146, 0x0) 10:26:01 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x147, 0x0) [ 406.792041][T15627] XFS (loop0): Mounting V4 Filesystem 10:26:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r3 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r3, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:02 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) [ 407.147877][T15627] XFS (loop0): empty log check failed [ 407.192516][T15627] XFS (loop0): log mount/recovery failed: error -5 10:26:02 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x148, 0x0) 10:26:02 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) [ 407.371806][T15627] XFS (loop0): log mount failed 10:26:02 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x149, 0x0) 10:26:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce19"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:26:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x14a, 0x0) 10:26:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce19"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:26:03 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:26:03 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x14b, 0x0) 10:26:03 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:26:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:03 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:03 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) [ 408.603189][T15690] XFS (loop0): Mounting V4 Filesystem 10:26:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x14c, 0x0) [ 408.692103][T15690] XFS (loop0): empty log check failed 10:26:04 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) [ 408.757174][T15690] XFS (loop0): log mount/recovery failed: error -5 [ 408.832207][T15690] XFS (loop0): log mount failed 10:26:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(0xffffffffffffffff, 0x80184153, &(0x7f0000000e80)={0x0, &(0x7f0000000e40)=[&(0x7f0000000440)="82bbac8493576591ea0153c3764625012de1a044a6b2e44b5633431518cd6e9dc06fe3e3e8170859b9ca40cdeb2cc185d433b591bf125a85f9b69e30e8c3321c51ce2f6538f142835bce572da2fe3d236abc39198f8d714411a0ddda", &(0x7f00000004c0)="70c6288cdfc8e277c987ded9b628e18e8dba59e4a0b363cdb2d00a768558c819df78d36f1143b9695c69f16df11d7b2014b0cd91aedf46c9f626f1323ae149800c7ac775ce99c407c4a028ec18cc6ba7edd017de56a4b3df193e9e4c4093380e90c987105dc346a8d13aeec4a056ed0fef12eeaed029205e9fa94da14fc48e4165d32e0d323f39e0fa40d5f63cec06b17683f674bf1ca75a931a2eb0c8710f2188d897e1195b927c8c32fd6eae25a022400926894f69830138684445aa5fbcb664e24a5575b41a800923a89a5de7d6315963832f806f018f2dc74c36fc24541d3f7a39877ef1", &(0x7f00000005c0)="adb7e94d8626bf0ac9e79146883e153b3ae9dd17b74a32a07080e7efe02335a08760e3d7f2ec657e4dd4ec085763634b45ebabb8e48d18f277e50c219618ac03d3ec457ea97e1102d98a3e2a2dc9e3c5e32c8949f7639a5a30a4f7fe44182d2bb1782e1fa96dd9b9c5e21f0cd3c6230194dd2a15142898d588c253aa4243ec64d5805bcff9a9fbe1f18ef6def5827e2e28b77d81ebf1e92d4df9f09666a8b7a82fbcec727cf21160dbea0482b2fa0acbd8d71de637fab5cb4e938dee7fb6e24f124ae11e625490dce190c33e745c07d2ed64885207671ce30fcff7", &(0x7f00000006c0)="a6410ee970c614d148d7e1e4348c89ba233007ca4afc786b2d1d74d639afb4a02027d47e", &(0x7f0000000700)="25792ba8a38a06d12385fe6bb4a778acd88342c5756b249deed0ff3d8dad535ddd4c608211c48da1c46f8cd3cb76fba4608a25ed30b8d52060bd1d1686b996e5a613ed262c76cb34f09ea5ba721d2d42db9a63d009ef761b6f4d3e943b592b47348705176abe868cb55d3fcc8f52e0ab90dea0e251c1e7ee4a90aadf6e9353f6a2b6532e6d63060d10f6bd6f4c06b398138874b561a03a975edfe82095a89bfd0c069afbdea7cfdc2f9ede9962f7cdbbfcff8b2751b99d47babeaaf3c5efe951dee785e32ce932a25fd020ee5f8b755770e45a63f2ee87851d2e42c0b204de4016562ed2be9f216260c34f8fb03935", &(0x7f0000000e00)="1b05ee1673c56ab56405fe06360329e2b114e99655570f343a568446e15111ae51c289bce5984dafb8fcda62cd19ce19"]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xcd8e) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) 10:26:04 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x14d, 0x0) 10:26:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$rose(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) io_setup(0x0, &(0x7f0000000080)) r2 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r2, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:04 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:26:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:04 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_dev$tty(&(0x7f0000000240)='/dev/tty1\x00', 0x0, 0x40282) write$binfmt_elf64(r4, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0x40, 0x2dc, 0x0, 0x0, 0x38, 0x1}, [{0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x10000}], "a2813445b99a60d3397719247b6f8f9b5c44da20c23ec7a5e6b8ac0cc1321481397ef917df8c657f56d68f03843eb370ff4a6614b2a59c076dc5212b636e505d379069329b9f4f8b05a97b3ebc4162ba59718de57af717c16d7b4a42c37939b5dfd819c9141eb2a41b12ba", [[], [], []]}, 0x3e3) 10:26:04 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:26:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x14e, 0x0) 10:26:05 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x47}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00\xf5\x98\x9c\\0k\xfd\xd1\xee\xe3\\I\xfd\x9e\x90\xeb\x1d\xe2\x0f\xfeR\xb1`\xe5(\x988\x15n\n\xb2\xef\x8e,\x83\xd93\x1fH\xdd\x91W\xc2d N\xff\xff1\x984e\x8b#\x9bC\x90\xf0x\xdb\xbci\xde\xae\xc8T>A\xf2\xacJs\xe2K\xfc\xf9V\x81\x9e\x00M\x1c\xb7E\xcb\x83\xf5\x01y&\x0f\xc7\xe6\xbd}\x16\xaa\x7f@\x16\a\xfc\\q\x1a\x8d\fpL.\x1e\x1c\xf9\x99\x9d\xa8\x1cY\x12\vS\xde\x03\xc5\x0fg\x9d\xbf*\xc0\xa3\xf0B\xd3\xef&\xeb\xb4\xba\x8fD\xe7\x180\x94\xfb\xe1\x91L\xb7bb\x0e\xd4\xd70\x8d\xb6;Ge\x81\xee\xebP\xb7l\x94\x93\xd1\xc7@\xd4.\xa5\x9fO\r\x1c\xa6/\xdcXq9\x9f\xe5\xa9b|\x1d\x18b\xbdu*8\xae\xdb\v\xb2\xa5\x1f\x95\"\xa8\xd6TA)k!+(-\xfc\xb3\x0477\r\xa0\xee\x02n\xdf\x92\xcc\xbe-\x14uI\xe6\xf4\x7f\x0fk\x02\n\xe5Q\xa7x\xf9P\xf9\xfa\x00\x00\x00') setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x3f, 0x1, 0x1f, "f17522054e3d053d8c650cd815f46e2c", "5daede605aeb7420bb070e2dc32b9c54507f22ee7467efec1bb51c4fb35a417ec162e91513e6adcf6a59"}, 0x3f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x14f, 0x0) 10:26:05 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:26:05 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) 10:26:05 executing program 4: r0 = socket$inet6(0xa, 0x800000001, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0xfe7c) accept4(r0, 0x0, 0x0, 0x0) [ 410.487078][T15764] XFS (loop0): Mounting V4 Filesystem [ 410.592681][T15764] ================================================================== [ 410.601109][T15764] BUG: KASAN: use-after-free in xlog_alloc_log+0x1398/0x14b0 [ 410.608483][T15764] Read of size 8 at addr ffff88804ecf8090 by task syz-executor.0/15764 [ 410.616807][T15764] [ 410.619146][T15764] CPU: 0 PID: 15764 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 410.627464][T15764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.627483][T15764] Call Trace: [ 410.627507][T15764] dump_stack+0x197/0x210 [ 410.627522][T15764] ? xlog_alloc_log+0x1398/0x14b0 [ 410.627540][T15764] print_address_description.constprop.0.cold+0xd4/0x30b [ 410.627556][T15764] ? xlog_alloc_log+0x1398/0x14b0 [ 410.663367][T15764] ? xlog_alloc_log+0x1398/0x14b0 [ 410.668560][T15764] __kasan_report.cold+0x1b/0x41 [ 410.673494][T15764] ? kvmalloc_node+0xb0/0x100 [ 410.678152][T15764] ? xlog_alloc_log+0x1398/0x14b0 [ 410.683360][T15764] kasan_report+0x12/0x20 [ 410.687819][T15764] __asan_report_load8_noabort+0x14/0x20 [ 410.693443][T15764] xlog_alloc_log+0x1398/0x14b0 [ 410.698277][T15764] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 410.704587][T15764] xfs_log_mount+0xdc/0x780 [ 410.709147][T15764] xfs_mountfs+0xdb9/0x1be0 [ 410.713651][T15764] ? xfs_default_resblks+0x60/0x60 [ 410.718893][T15764] ? init_timer_key+0x13b/0x3a0 [ 410.723744][T15764] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 410.729143][T15764] ? xfs_filestream_get_ag+0x60/0x60 [ 410.734470][T15764] xfs_fs_fill_super+0xd24/0x1750 [ 410.739580][T15764] mount_bdev+0x304/0x3c0 [ 410.743892][T15764] ? xfs_test_remount_options+0x90/0x90 [ 410.749424][T15764] xfs_fs_mount+0x35/0x40 [ 410.753732][T15764] ? xfs_finish_flags+0x490/0x490 [ 410.758805][T15764] legacy_get_tree+0x108/0x220 [ 410.763567][T15764] vfs_get_tree+0x8e/0x300 [ 410.767966][T15764] do_mount+0x135a/0x1b50 [ 410.772276][T15764] ? retint_kernel+0x2b/0x2b [ 410.776848][T15764] ? copy_mount_string+0x40/0x40 [ 410.781766][T15764] ? copy_mount_options+0x241/0x3f0 [ 410.786946][T15764] ? __sanitizer_cov_trace_pc+0x1a/0x50 [ 410.792476][T15764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.798700][T15764] ? copy_mount_options+0x2e8/0x3f0 [ 410.803883][T15764] ksys_mount+0xdb/0x150 [ 410.808124][T15764] __x64_sys_mount+0xbe/0x150 [ 410.812799][T15764] do_syscall_64+0xfa/0x790 [ 410.817308][T15764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.823180][T15764] RIP: 0033:0x45d0ca [ 410.827135][T15764] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 410.846834][T15764] RSP: 002b:00007fbdf00fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 410.855500][T15764] RAX: ffffffffffffffda RBX: 00007fbdf00fbb40 RCX: 000000000045d0ca [ 410.863472][T15764] RDX: 00007fbdf00fbae0 RSI: 0000000020000000 RDI: 00007fbdf00fbb00 [ 410.871548][T15764] RBP: 0000000000000001 R08: 00007fbdf00fbb40 R09: 00007fbdf00fbae0 [ 410.879517][T15764] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 410.887497][T15764] R13: 00000000004cab30 R14: 00000000004e3f70 R15: 00000000ffffffff [ 410.895654][T15764] [ 410.897991][T15764] Allocated by task 15764: [ 410.902452][T15764] save_stack+0x23/0x90 [ 410.906597][T15764] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 410.912215][T15764] kasan_kmalloc+0x9/0x10 [ 410.916530][T15764] __kmalloc+0x163/0x770 [ 410.920760][T15764] kmem_alloc+0x15b/0x4d0 [ 410.925096][T15764] xlog_alloc_log+0xcce/0x14b0 [ 410.929862][T15764] xfs_log_mount+0xdc/0x780 [ 410.934372][T15764] xfs_mountfs+0xdb9/0x1be0 [ 410.938864][T15764] xfs_fs_fill_super+0xd24/0x1750 [ 410.943879][T15764] mount_bdev+0x304/0x3c0 [ 410.948192][T15764] xfs_fs_mount+0x35/0x40 [ 410.952506][T15764] legacy_get_tree+0x108/0x220 [ 410.957260][T15764] vfs_get_tree+0x8e/0x300 [ 410.965409][T15764] do_mount+0x135a/0x1b50 [ 410.969725][T15764] ksys_mount+0xdb/0x150 [ 410.973957][T15764] __x64_sys_mount+0xbe/0x150 [ 410.978621][T15764] do_syscall_64+0xfa/0x790 [ 410.983413][T15764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.989281][T15764] [ 410.991597][T15764] Freed by task 15764: [ 410.995658][T15764] save_stack+0x23/0x90 [ 410.999803][T15764] __kasan_slab_free+0x102/0x150 [ 411.004725][T15764] kasan_slab_free+0xe/0x10 [ 411.009217][T15764] kfree+0x10a/0x2c0 [ 411.013175][T15764] kvfree+0x61/0x70 [ 411.016987][T15764] xlog_alloc_log+0xeb5/0x14b0 [ 411.022006][T15764] xfs_log_mount+0xdc/0x780 [ 411.026500][T15764] xfs_mountfs+0xdb9/0x1be0 [ 411.030990][T15764] xfs_fs_fill_super+0xd24/0x1750 [ 411.036007][T15764] mount_bdev+0x304/0x3c0 [ 411.040348][T15764] xfs_fs_mount+0x35/0x40 [ 411.044754][T15764] legacy_get_tree+0x108/0x220 [ 411.049510][T15764] vfs_get_tree+0x8e/0x300 [ 411.053915][T15764] do_mount+0x135a/0x1b50 [ 411.058231][T15764] ksys_mount+0xdb/0x150 [ 411.062462][T15764] __x64_sys_mount+0xbe/0x150 [ 411.067131][T15764] do_syscall_64+0xfa/0x790 [ 411.071630][T15764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.077525][T15764] [ 411.079845][T15764] The buggy address belongs to the object at ffff88804ecf8000 [ 411.079845][T15764] which belongs to the cache kmalloc-1k of size 1024 [ 411.094229][T15764] The buggy address is located 144 bytes inside of [ 411.094229][T15764] 1024-byte region [ffff88804ecf8000, ffff88804ecf8400) [ 411.107735][T15764] The buggy address belongs to the page: [ 411.113496][T15764] page:ffffea00013b3e00 refcount:1 mapcount:0 mapping:ffff8880aa400c40 index:0x0 [ 411.122607][T15764] raw: 00fffe0000000200 ffffea00013b9708 ffffea0001527408 ffff8880aa400c40 [ 411.131192][T15764] raw: 0000000000000000 ffff88804ecf8000 0000000100000002 0000000000000000 [ 411.139801][T15764] page dumped because: kasan: bad access detected [ 411.146337][T15764] [ 411.148658][T15764] Memory state around the buggy address: [ 411.154317][T15764] ffff88804ecf7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 411.162598][T15764] ffff88804ecf8000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 411.177059][T15764] >ffff88804ecf8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 411.185110][T15764] ^ [ 411.189777][T15764] ffff88804ecf8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 411.197856][T15764] ffff88804ecf8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 411.205902][T15764] ================================================================== [ 411.214215][T15764] Disabling lock debugging due to kernel taint [ 411.228984][T15764] Kernel panic - not syncing: panic_on_warn set ... [ 411.236377][T15764] CPU: 0 PID: 15764 Comm: syz-executor.0 Tainted: G B 5.4.0-syzkaller #0 [ 411.246097][T15764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.256157][T15764] Call Trace: [ 411.259452][T15764] dump_stack+0x197/0x210 [ 411.264174][T15764] panic+0x2e3/0x75c [ 411.268248][T15764] ? add_taint.cold+0x16/0x16 [ 411.273109][T15764] ? xlog_alloc_log+0x1398/0x14b0 [ 411.278283][T15764] ? preempt_schedule+0x4b/0x60 [ 411.283134][T15764] ? ___preempt_schedule+0x16/0x18 [ 411.288322][T15764] ? trace_hardirqs_on+0x5e/0x240 [ 411.293646][T15764] ? xlog_alloc_log+0x1398/0x14b0 [ 411.298686][T15764] end_report+0x47/0x4f [ 411.303048][T15764] ? xlog_alloc_log+0x1398/0x14b0 [ 411.308237][T15764] __kasan_report.cold+0xe/0x41 [ 411.313101][T15764] ? kvmalloc_node+0xb0/0x100 [ 411.317948][T15764] ? xlog_alloc_log+0x1398/0x14b0 [ 411.323522][T15764] kasan_report+0x12/0x20 [ 411.327989][T15764] __asan_report_load8_noabort+0x14/0x20 [ 411.334050][T15764] xlog_alloc_log+0x1398/0x14b0 [ 411.339343][T15764] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 411.345786][T15764] xfs_log_mount+0xdc/0x780 [ 411.350306][T15764] xfs_mountfs+0xdb9/0x1be0 [ 411.354808][T15764] ? xfs_default_resblks+0x60/0x60 [ 411.360075][T15764] ? init_timer_key+0x13b/0x3a0 [ 411.365346][T15764] ? xfs_mru_cache_create+0x4a0/0x5b0 [ 411.370834][T15764] ? xfs_filestream_get_ag+0x60/0x60 [ 411.376302][T15764] xfs_fs_fill_super+0xd24/0x1750 [ 411.381330][T15764] mount_bdev+0x304/0x3c0 [ 411.385874][T15764] ? xfs_test_remount_options+0x90/0x90 [ 411.391468][T15764] xfs_fs_mount+0x35/0x40 [ 411.395787][T15764] ? xfs_finish_flags+0x490/0x490 [ 411.400808][T15764] legacy_get_tree+0x108/0x220 [ 411.405572][T15764] vfs_get_tree+0x8e/0x300 [ 411.410000][T15764] do_mount+0x135a/0x1b50 [ 411.414336][T15764] ? retint_kernel+0x2b/0x2b [ 411.418930][T15764] ? copy_mount_string+0x40/0x40 [ 411.423889][T15764] ? copy_mount_options+0x241/0x3f0 [ 411.429343][T15764] ? __sanitizer_cov_trace_pc+0x1a/0x50 [ 411.434891][T15764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.441302][T15764] ? copy_mount_options+0x2e8/0x3f0 [ 411.446584][T15764] ksys_mount+0xdb/0x150 [ 411.450897][T15764] __x64_sys_mount+0xbe/0x150 [ 411.455568][T15764] do_syscall_64+0xfa/0x790 [ 411.460068][T15764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.466349][T15764] RIP: 0033:0x45d0ca [ 411.470401][T15764] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 411.490187][T15764] RSP: 002b:00007fbdf00fba88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 411.498596][T15764] RAX: ffffffffffffffda RBX: 00007fbdf00fbb40 RCX: 000000000045d0ca [ 411.506558][T15764] RDX: 00007fbdf00fbae0 RSI: 0000000020000000 RDI: 00007fbdf00fbb00 [ 411.514652][T15764] RBP: 0000000000000001 R08: 00007fbdf00fbb40 R09: 00007fbdf00fbae0 [ 411.522997][T15764] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 411.531088][T15764] R13: 00000000004cab30 R14: 00000000004e3f70 R15: 00000000ffffffff [ 411.541091][T15764] Kernel Offset: disabled [ 411.545582][T15764] Rebooting in 86400 seconds..