95752cd4ebe9562a06d1870309ec1e08cbcd82015820006d205bb44169565b6709b919bbf6757e0fedb0822a8d28493e8a6f8"], 0x78) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=@known='trusted.syz\x00', &(0x7f0000000740)=""/210, 0xd2) socket$inet6_udp(0xa, 0x2, 0x0) connect$vsock_stream(r0, &(0x7f0000000440)={0x28, 0x0, 0x2710, @reserved}, 0x10) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', 0x1, 0xfffffffffffffffd) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000480)=0x3, 0x4) accept4$tipc(0xffffffffffffffff, &(0x7f0000000140)=@name, &(0x7f00000002c0)=0x10, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000003c0)={0x7, 0x401}, 0x2) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) dup3(0xffffffffffffffff, r2, 0x0) ioctl$PPPIOCDISCONN(r0, 0x7439) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x3, 0x801, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000400)={0x3, 0x401, 0x3}) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000240)={@dev, @broadcast}, &(0x7f0000000380)=0xc) socketpair(0x11, 0x7, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:56:03 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 09:56:03 executing program 5: shmctl$SHM_INFO(0x0, 0x64, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) 09:56:03 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:03 executing program 5: shmctl$SHM_INFO(0x0, 0x64, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x4000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000000)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', r1}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) [ 308.264657][T16894] XFS (loop1): Invalid superblock magic number 09:56:03 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:03 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x2000) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) writev(r0, &(0x7f0000001600)=[{&(0x7f00000000c0)="3686035c03144cb859be9731fdd1f892a3e15e30f391285636e04f132110a7eab0157a5a5584c43b8c1d0c94aa6375ab026ddb29662981ce33057838fd4b73b7ea5bdbd0db1f76c0eff16db4d462a2db53b582a10a095695e82aae3c3e3014c89f7b0b2d21d87a3a6fbe790c7a53ef7e503892a25e834f4fc5bb1d1121bfa8138c954d1751301da831272a7463d20fe2199a847cae99c5172ce5bd099723d771c46d61bb4a9d157385bda1532eb6ee95d15e3b21c03286488fca2cfa2c7b87680d1064a2a0f19e0117", 0xc9}, {&(0x7f00000001c0)="db714d61058aa8146484d131ba0cb3c1ddcffe8b0fea15455dddb8bc4d9b236526d614a248fc7e37ac942464bbdc9649c6a808df1a33252db88b1723e67d295023ee4460d3c342870b546ea72dff2a6ada472114c415cb239c66abfff64a0ca72c6393f9086b5fb2950dcb687b52e438226c", 0x72}, {&(0x7f0000000240)="b38b", 0x2}, {&(0x7f0000000280)="4c9a2fb21d345d9f515552254013388c2696fe4be652661bf2f3366e19b6e3454770a47a89c10d14d3458640dc8e14a14a03a4b48e62c9c21d942e07999d60549ed261c94bd058d6ac6bed31e6070cc7dd58770598aea46c83e7feb7eb0a9af1a7a35974156c7474f9c3f59b3e76852c35ae291ef56aa8828ea7d6c21aa8c0152bc133d4e10eda1f37f7c38d7d8bdf9f7cb4b53c594fd222a0f7e3929abc9e4ca08e2022dd1202bc2dbac2b77fb2f2b7a6806b518a6016855af07afd5e49295963", 0xc1}, {&(0x7f0000000380)="f0cc99c72fc3c77c23e0d26ad97aa306edda7b85564e6cab23ab4f817689655503692368498b4342356478363cda34b369bfc35ab1b9df1f75a974dc94dacc4fd6e4b8e1ec56760dc0774285478a32b9a7f30a006987db558143288445", 0x5d}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="42cd8bd75603f843b2ad7475659f43003db316314c1c34cd0bcdbd0b89e0a998c67af9c1cd3fddde34d1f2b4622e3ab54e8379ab2b37ec575cff5320ad9db963f58f5c9670abd313699a8dab1b921c9d333992507c685d178bac64e75a85e25f8fdd4d3c820c9e2fd0c69c6a98a7ebb25bea6e19b9e70f3be3a7b183", 0x7c}, {&(0x7f0000001480)}, {&(0x7f00000014c0)="3fbb0ac56a1f65132dcf6712cc013dcf88e2d400e30c35a4cf78478c517d3b15099ed17fc4e70d232c1d59e6404622d3571d3f0f8d06d42da0cfb8659c8af24b14b73557887621e8f766ba410026bc32e0b9c87d6c9ad97b2e12375d484010fa17dc6ad223328a3d27df0647f0a6aa97119a46e8e9155c5b6c01214441304edf05324d650f6d425593bef27ecd", 0x8d}, {&(0x7f0000001580)="625bc7bff728f4bba72f9ffe87c9bca28915888f1855e6ad006c4d0aa3a1c3d7e405e053b49cf2abd887ed18f1ac66348a5a3ded0a738886f087ff97be27c8960eadcfcf0e1ffc34", 0x48}], 0xa) 09:56:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:04 executing program 5: shmctl$SHM_INFO(0x0, 0x64, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) 09:56:04 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x128) r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x200000) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000840)=ANY=[@ANYBLOB="6e617400000000001b000000000000000000000000000000000000000000050000050000000000060000000000000000000000000000000000000000aa0860f70d2e76105d974a0000000000000000000000000000d16e00001e08000000001fd84e988100000000000000000027cc00003c1175fac5c4513b70a264000000bf8e2701008e1dca837dd11f5d362c9f30213ac02048f42de5966492d8d9e99e33a72beb25dac2b422f0de057086102d1277281993dd64e1d0163fdd7f2051c60fce7347fdeb42a2c1f5cfeefa47a0ff23cebafc79f9960a8a8d428e406d83bd83fd3ed4696664232b439a91f3d4d23943ea7a3537a4a87aa27aa9b7f2507667c9920a1c2455024ec81d514444c1fe311fb08cce64a0995dbc5a6e7fcf51e1828be0fbe36f445e78c61c8641870d339ea196aa979b894600c18b24750b74e39aaa506abf9c20eca75fb6c54e2dfb6cb8a335388b483f5c4602c66533ed08674444a3a5831eb08ef47dec1bea7ef8623721d44200843c1f312bb41af4479b9ae1e183a70e153dbba45a21f71494f7752027f7e39797443a9c8cd1bb63fc5ea8e1ab4a8a440f61dfc7b10f9046118c6ce023f2b8e61a23ad9a28ac4556d2aeacbbcfd1e2cc49e5470a310b7a7b77e19d8e02bf495752cd4ebe9562a06d1870309ec1e08cbcd82015820006d205bb44169565b6709b919bbf6757e0fedb0822a8d28493e8a6f8"], 0x78) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=@known='trusted.syz\x00', &(0x7f0000000740)=""/210, 0xd2) socket$inet6_udp(0xa, 0x2, 0x0) connect$vsock_stream(r0, &(0x7f0000000440)={0x28, 0x0, 0x2710, @reserved}, 0x10) syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', 0x1, 0xfffffffffffffffd) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000480)=0x3, 0x4) accept4$tipc(0xffffffffffffffff, &(0x7f0000000140)=@name, &(0x7f00000002c0)=0x10, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000003c0)={0x7, 0x401}, 0x2) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) dup3(0xffffffffffffffff, r2, 0x0) ioctl$PPPIOCDISCONN(r0, 0x7439) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x3, 0x801, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000400)={0x3, 0x401, 0x3}) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000240)={@dev, @broadcast}, &(0x7f0000000380)=0xc) socketpair(0x11, 0x7, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000080)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:56:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") [ 308.997585][T16944] XFS (loop1): Invalid superblock magic number 09:56:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:04 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x3}) 09:56:04 executing program 4: 09:56:04 executing program 4: 09:56:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:04 executing program 5: r0 = shmget(0x2, 0x1000, 0x78000000, &(0x7f0000fff000/0x1000)=nil) r1 = getuid() getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getgroups(0x6, &(0x7f0000000240)=[0x0, 0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00]) r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000280)='vmnet1\'keyringem0\x00', 0xffffffffffffffff}, 0x30) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000300)={{0x401, r1, r2, r3, r4, 0x102, 0x100000000}, 0x2, 0x6, 0x7, 0x7ff, r5, r6, 0x1}) shmctl$SHM_INFO(r0, 0x64, 0x0) r7 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept4(r7, &(0x7f0000000040)=@un=@abs, &(0x7f00000000c0)=0x80, 0x9fd146e2212d26f9) [ 309.485125][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 309.490973][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 309.496778][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 309.502518][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 309.645085][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 309.645091][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.645135][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 309.650899][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:05 executing program 4: 09:56:05 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x18) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e21, 0x8, @empty, 0x1}, {0xa, 0x4e22, 0x3, @local, 0x4}, 0x1, [0x3ff, 0x8000000000000000, 0x7, 0x0, 0x6e0a, 0x10000, 0x9, 0x100000001]}, 0x5c) shmctl$SHM_INFO(0x0, 0x64, 0x0) 09:56:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") [ 309.868018][T16997] XFS (loop1): Invalid superblock magic number 09:56:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:05 executing program 5: shmget(0x2, 0x2000, 0x1000, &(0x7f0000ffe000/0x2000)=nil) r0 = shmget$private(0x0, 0xe000, 0x54000000, &(0x7f0000ff2000/0xe000)=nil) shmctl$SHM_INFO(r0, 0x64, 0x0) r1 = socket(0x11, 0x80000, 0x3) getsockname$netrom(r1, &(0x7f0000000080)={{0x3, @null}, [@netrom, @netrom, @remote, @remote, @default, @netrom, @netrom]}, &(0x7f0000000100)=0x48) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x2, 0x9, 0x400, 0x3}, {0x0, 0x0, 0x2, 0x1d}, {0x9, 0x10000, 0x200, 0x5}, {0x9, 0x9, 0x5, 0x5}]}, 0xfffffffffffffdee) 09:56:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x6c, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, 0x0, &(0x7f0000001300)) r4 = dup2(r0, r2) dup3(r4, r1, 0x0) 09:56:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:05 executing program 5: shmget(0x2, 0x1000, 0x80, &(0x7f0000ffd000/0x1000)=nil) r0 = shmget(0x0, 0x3000, 0x100, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r0, 0x64, 0x0) 09:56:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:05 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000140)="add61c85e930f01998ddac4ab3efe5977d09e3d5180bc3c09a59c7c8670292cfa8eeefa1e64229f3ac977a5b2c72ad98e912cafaf4b0a31bde8e11ed476f1eddeb2c452980635b3cdba80c5a997f16e0cb59bf64e328bfd2edf558153e6c8b5300d2c936acd2f6359dfd714f9fe52e18", 0x70, 0x4000000, &(0x7f00000001c0)=@isdn={0x22, 0x8, 0x1, 0x7000, 0x35b}, 0x80) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x4000, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xa905, 0x6, 0x1e, 0x1d, "8732c416c39145d9b200c0f784e88105ee8dff44ef6eea0b31955209937ab2ef647d75266684709bc005ab2e5c7206a38fe85cb61f1579cc1858f24cc92768ea", "f0bfb52f4eafe1aac8263faa051a1170bba1a0c87ceeb19f5e9b477eb1b18d72", [0xffffffff, 0x3]}) 09:56:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:05 executing program 5: shmctl$SHM_INFO(0x0, 0x64, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x43e702caea2ccd17, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 09:56:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x40a) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/52) 09:56:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 09:56:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:06 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:06 executing program 5: shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffa000/0x3000)=nil) r0 = shmget$private(0x0, 0x1000, 0x400, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_INFO(r0, 0x64, 0x0) [ 310.811810][T17056] XFS (loop1): Invalid superblock magic number 09:56:06 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b"}, 0x60) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 09:56:06 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:06 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x301001, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000002340)={&(0x7f0000000040)={0x27, 0x0, 0x0, 0x3, 0x8, 0x4, "41c217bc0439714712d0f2a5f7620b1e529cc92d16b9dcb0a06f0fcede98b1542bdae5e9e47566d62ca856c382fe65f609d2b25e57096590284bcf40d57dd2", 0x29}, 0x60, &(0x7f00000021c0)=[{&(0x7f00000000c0)="8b760934247bd512c05a80884a64502bd68b6200562eeb105bd9d4b22ec559424938f2e842484e44581d52fc2533ff6e3625f809a764e7888d4169381852ce7cf6dccf3aa582e9d219513678e0aba0558beb3824fce6654e07641e424bb8ec597de0a183", 0x64}, {&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="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", 0x1000}, {&(0x7f0000002140)}, {&(0x7f0000002180)="7c0adadb80621c49e919ffa8724c1cfaff737ac92d1d8250b8ff226ca685e7a37855c1eb501d97aacfc8ac22e20d36", 0x2f}], 0x5, &(0x7f0000002240)={0x100, 0x111, 0x4, "ae1f6dd243d5de791b242f880ed910c85ad9a7b114b7b6aba836ba57ae6c4ae7861906cb700483c01d271c2a8d2b53e0580e5fc9e44ecf91b26b024f5f02442d9ff3a7b4262e796b3a04192d827ac39f1ac7115c120ec36509914cd10106df1b8b70adf38585c64bf0d1ef15d1b2f9de6bc1981d3a7313942d882747bd5602b3e027041a6660389549217131664c40109e051602d0c4ad44af5abff97a8ef0eda6279efe91f1e43af8f6aaf0bf11f5098aa5132e58888e3c3a1f04dd230b0cd6a4ff1d01aa04d4da31df3d450a33de24cb301ed14d44e42a75ee40778f463fe41a3ea7a55b94ce03e9ac6e"}, 0x100, 0x10}, 0x8000) shmctl$SHM_INFO(0x0, 0x64, 0x0) 09:56:06 executing program 4: [ 311.165066][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 311.170866][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:06 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:06 executing program 5: shmctl$SHM_INFO(0x0, 0x64, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xfffffffffffffff9, 0x300c0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'veth0_to_bond\x00', @remote}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000040)=0x1f) 09:56:06 executing program 4: 09:56:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 09:56:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:07 executing program 4: 09:56:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:07 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000001c0), 0x4) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x109100) read$rfkill(r0, &(0x7f0000000200), 0x8) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/171) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @remote}, {0x2, 0x4e24, @empty}, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10001, 0x5, 0x81}) r2 = shmget(0x1, 0x2000, 0xcff0f4c9e4976086, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_INFO(r2, 0x64, 0x0) [ 311.718441][T17109] XFS (loop1): Invalid superblock magic number 09:56:07 executing program 4: 09:56:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 311.832318][T17130] vivid-000: kernel_thread() failed 09:56:07 executing program 5: 09:56:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:07 executing program 4: 09:56:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:07 executing program 5: 09:56:07 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 09:56:07 executing program 4: 09:56:07 executing program 5: 09:56:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:08 executing program 4: [ 312.653457][T17160] XFS (loop1): Invalid superblock magic number 09:56:08 executing program 5: 09:56:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:08 executing program 4: 09:56:08 executing program 5: 09:56:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 09:56:08 executing program 4: 09:56:08 executing program 5: 09:56:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:08 executing program 4: 09:56:08 executing program 5: [ 313.612265][T17204] XFS (loop1): Invalid superblock magic number 09:56:09 executing program 4: 09:56:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:09 executing program 5: 09:56:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:09 executing program 4: 09:56:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:09 executing program 5: 09:56:09 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 09:56:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:09 executing program 5: 09:56:09 executing program 4: 09:56:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:09 executing program 5: [ 314.512272][T17255] XFS (loop1): Invalid superblock magic number 09:56:09 executing program 4: 09:56:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:10 executing program 4: 09:56:10 executing program 5: 09:56:10 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 09:56:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:10 executing program 5: 09:56:10 executing program 4: [ 315.325080][ C1] net_ratelimit: 14 callbacks suppressed [ 315.325088][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 315.336544][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:10 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 315.402179][T17299] XFS (loop1): Invalid superblock magic number 09:56:10 executing program 5: 09:56:10 executing program 4: 09:56:10 executing program 5: [ 315.725102][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 315.730941][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 315.736769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 315.742526][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 315.885070][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 315.885100][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 315.890845][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:11 executing program 4: 09:56:11 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:11 executing program 5: 09:56:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 09:56:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:11 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:11 executing program 5: 09:56:11 executing program 4: [ 316.272845][T17347] XFS (loop1): Invalid superblock magic number 09:56:11 executing program 5: 09:56:11 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:11 executing program 4: 09:56:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:12 executing program 5: 09:56:12 executing program 4: 09:56:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 09:56:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:12 executing program 5: 09:56:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:12 executing program 4: 09:56:12 executing program 5: 09:56:12 executing program 4: [ 317.288244][T17390] XFS (loop1): Invalid superblock magic number 09:56:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 317.405087][ C1] protocol 88fb is buggy, dev hsr_slave_0 09:56:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:13 executing program 5: 09:56:13 executing program 4: 09:56:13 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, 0x0) 09:56:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:13 executing program 5: 09:56:13 executing program 4: 09:56:13 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:13 executing program 4: [ 318.165839][T17436] XFS (loop1): Invalid superblock magic number 09:56:13 executing program 5: 09:56:13 executing program 4: 09:56:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:14 executing program 5: 09:56:14 executing program 4: 09:56:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, 0x0) 09:56:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:14 executing program 4: 09:56:14 executing program 5: 09:56:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:14 executing program 4: [ 319.102866][T17480] XFS (loop1): Invalid superblock magic number 09:56:14 executing program 4: 09:56:14 executing program 5: 09:56:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:15 executing program 4: 09:56:15 executing program 5: 09:56:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, 0x0) 09:56:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:15 executing program 4: 09:56:15 executing program 5: 09:56:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 319.969187][T17521] XFS (loop1): Invalid superblock magic number 09:56:15 executing program 4: 09:56:15 executing program 5: 09:56:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 320.365065][ C1] net_ratelimit: 13 callbacks suppressed [ 320.365073][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 320.376497][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:16 executing program 5: 09:56:16 executing program 4: 09:56:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)) 09:56:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:16 executing program 5: 09:56:16 executing program 4: 09:56:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000040)='mounts\x00') write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 320.876089][T17565] XFS (loop1): Invalid superblock magic number 09:56:16 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x6, 0x100) recvfrom$inet(r0, 0x0, 0xfffffffffffffdd7, 0x2142, 0x0, 0xfffffe4d) lstat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000840)) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x400000000006000) ioctl$TIOCSCTTY(r0, 0x540e, 0x6) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 09:56:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 321.565076][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 321.570884][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:16 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "eb81c63531a0893be860a3e8dd02d4135c2ffbdaf9ce78d38d5bd90d8a6e04509078582ff11da42852c3367e6e25c323e6e0d94e5751c34c121e4101fce9f4"}, 0x60) 09:56:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)) 09:56:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:17 executing program 4: shmctl$SHM_INFO(0x0, 0x64, 0x0) r0 = getuid() syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) getuid() [ 321.774261][T17616] XFS (loop1): Invalid superblock magic number 09:56:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:17 executing program 4: shmctl$SHM_INFO(0x0, 0x64, 0x0) r0 = getuid() syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) getuid() [ 321.884181][T17643] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 321.965092][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 321.970887][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 321.976742][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 321.982484][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 321.993631][T17648] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 322.125075][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 322.130931][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:56:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:17 executing program 4: shmctl$SHM_INFO(0x0, 0x64, 0x0) r0 = getuid() syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) getuid() 09:56:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)) 09:56:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x3f00000000000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:18 executing program 4: shmctl$SHM_INFO(0x0, 0x64, 0x0) r0 = getuid() syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) [ 322.684597][T17678] XFS (loop4): unknown mount option [fowner=00000000000000000000]. [ 322.719495][T17675] XFS (loop1): Invalid superblock magic number 09:56:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 322.843751][T17704] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:18 executing program 4: shmctl$SHM_INFO(0x0, 0x64, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") [ 323.012472][T17716] XFS (loop4): unknown mount option [fowner=00000000000000000000]. [ 323.173442][T17724] XFS (loop1): Invalid superblock magic number 09:56:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@empty, 0x60, r1}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/92, 0x5c}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/59, 0x3b}, {&(0x7f0000000400)=""/71, 0x47}, {&(0x7f0000000480)=""/193, 0xc1}], 0x5, &(0x7f0000000600)=""/78, 0x4e}, 0x12003) shmget(0x3, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") [ 323.565136][T17745] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 323.642883][T17744] XFS (loop1): Invalid superblock magic number [ 323.682175][T17742] XFS (loop5): unknown mount option [nobarrier]. 09:56:19 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@empty, 0x60, r1}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/92, 0x5c}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/59, 0x3b}, {&(0x7f0000000400)=""/71, 0x47}, {&(0x7f0000000480)=""/193, 0xc1}], 0x5, &(0x7f0000000600)=""/78, 0x4e}, 0x12003) shmget(0x3, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:19 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 324.015667][T17784] XFS (loop5): unknown mount option [nobarrier]. 09:56:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") 09:56:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:19 executing program 4: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@empty, 0x60, r1}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/92, 0x5c}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/59, 0x3b}, {&(0x7f0000000400)=""/71, 0x47}, {&(0x7f0000000480)=""/193, 0xc1}], 0x5, &(0x7f0000000600)=""/78, 0x4e}, 0x12003) shmget(0x3, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) [ 324.502347][T17814] XFS (loop5): unknown mount option [nobarrier]. 09:56:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 324.580009][T17810] XFS (loop1): Invalid superblock magic number 09:56:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@empty, 0x60, r1}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/92, 0x5c}, {&(0x7f0000000340)=""/108, 0x6c}, {&(0x7f00000003c0)=""/59, 0x3b}, {&(0x7f0000000400)=""/71, 0x47}, {&(0x7f0000000480)=""/193, 0xc1}], 0x5, &(0x7f0000000600)=""/78, 0x4e}, 0x12003) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 324.813882][T17848] XFS (loop5): unknown mount option [nobarrier]. 09:56:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") 09:56:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x32, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@empty, 0x60, r1}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) [ 325.401542][T17882] XFS (loop5): unknown mount option [nobarrier]. [ 325.478528][T17875] XFS (loop1): Invalid superblock magic number 09:56:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000080)="dc303efd4916503374333050815f982fc594cbb22215db13458952e745aa390fd287108f3c8b185e271072054ea5405361b2e8c41cfb642a780ce0ac7614622e3802730000f8d93c10ca2d7161c760d3d4e44e2db02f1776fa4e114a76f267277717caedd9753fa408a69131bf26f5413dc8f8fc803fd5034996a3a32cf984eee0f5a4e95190041abfcaa63680b6f1a872926a4f075f9fc1717f75d824edc8014577ca", 0xa3}, {&(0x7f0000000140)="d7d44a5a3e40f78e9bc35d06d2a5ba5f7f06e8ff9d292582d6299b0d86240705e2e8fb54b271d79b95f0b7ebfd81c978f587d57693ebc5958617cd0fe7444762fb6773c2a5cb9cc9c188baad020fb25b959ca852fb1f2a75c62bf66c3285253cb6e07ff3c2ac9ccf24ff5166d3081a78b0643aadbd75d9731858f5aba5d0", 0x7e, 0x1}, {&(0x7f00000001c0), 0x0, 0xfffffffffffffffa}, {&(0x7f0000000200)="5a596dca2b38e5ccde8335baa7d86bd74942d4a043a1258b01a785870750b439c0dc3872368f94e9d983e16ec52ef27e87e508839c0adabcbe35ed8b7c04e6d8fa48f9e27236a2264d0bd71951a1f945febf9cd49467e590cd870a771d53b9985b64f4efd213d02b3cc1173f1e0b70f244efd3", 0x73, 0x2}], 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@empty, 0x60, r1}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 325.652668][T17904] XFS (loop5): unknown mount option [nobarrier]. [ 325.668887][T17908] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") [ 325.725104][ C1] net_ratelimit: 14 callbacks suppressed [ 325.725113][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 325.736572][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 325.983661][T17924] XFS (loop1): Invalid superblock magic number [ 326.125087][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 326.130902][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 326.136717][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 326.142460][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:21 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 326.231933][T17945] XFS (loop5): unknown mount option [nobarrier]. [ 326.285074][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 326.285080][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 326.285125][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 326.290894][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 326.381332][T17952] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:21 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") 09:56:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 326.589374][T17970] XFS (loop5): unknown mount option [nobarrier]. [ 326.596547][T17968] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:56:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) [ 326.753129][T17974] XFS (loop1): Invalid superblock magic number [ 326.839259][T17997] XFS (loop5): unknown mount option [nobarrier]. [ 326.861227][T18001] XFS (loop4): Invalid superblock magic number 09:56:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:22 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x2b1, 0x0) 09:56:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") 09:56:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:56:22 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 327.576673][T18047] XFS (loop4): Invalid superblock magic number [ 327.584403][T18039] XFS (loop1): Invalid superblock magic number 09:56:22 executing program 5: syz_mount_image$xfs(0x0, &(0x7f0000000040)='./file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x2b1, 0x0) 09:56:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:56:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") 09:56:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 328.602676][T18111] XFS (loop4): Invalid superblock magic number [ 328.612709][T18109] XFS (loop1): Invalid superblock magic number 09:56:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="17b4d027a6f7", 0x6, 0x7f}, {&(0x7f00000000c0)="acb6009c86566c4cf31f28f45cb23be4085e6ee5468358db94b25652e863", 0x1e, 0x10000}], 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 329.018287][T18155] XFS (loop5): unknown mount option [nobarrier]. 09:56:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x2b1, 0x0) 09:56:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") 09:56:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 329.387750][T18175] XFS (loop5): unknown mount option [nobarrier]. [ 329.399285][T18174] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c70723d30303030303015e9d20ed3c0b6e517e330303030303030303030303032268e97fe592c0001d37909e096cf3cc69274b96b63"]) 09:56:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) [ 329.663671][T18204] XFS (loop5): unknown mount option [nobarrier]. [ 329.670841][T18178] XFS (loop1): Invalid superblock magic number [ 329.707263][T18208] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 329.931528][T18220] XFS (loop5): Invalid superblock magic number 09:56:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r1) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x2b1, 0x0) 09:56:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@gquota='gquota'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffdef, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:56:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r1) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x2b1, 0x0) [ 330.339900][T18249] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@uqnoenforce='uqnoenforce'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 330.497092][T18251] XFS (loop5): Invalid superblock magic number [ 330.557535][T18272] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r1) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x2b1, 0x0) 09:56:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@pquota='pquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:26 executing program 0: socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) [ 330.783950][T18287] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:26 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) 09:56:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:56:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@ikeep='ikeep'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 331.165683][T18314] XFS (loop4): unknown mount option [fowner=00000000000000000000]. [ 331.200698][T18312] XFS (loop5): Invalid superblock magic number 09:56:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@gquota='gquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) [ 331.278028][T18326] XFS (loop1): Invalid superblock magic number [ 331.368108][T18342] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) 09:56:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@usrquota='usrquota'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>', @ANYRESDEC=0x0]) 09:56:27 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) [ 331.679831][T18353] XFS (loop5): unknown mount option [nobarrier]. 09:56:27 executing program 0: socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) 09:56:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 331.720795][T18354] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarrier,nouuid,prjquota,nolazytime,obj_user=$6,fowner>']) 09:56:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@noattr2='noattr2'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 331.900284][T18379] XFS (loop5): unknown mount option [nobarrier]. [ 331.953413][T18365] XFS (loop1): Invalid superblock magic number [ 331.975065][ C1] net_ratelimit: 14 callbacks suppressed [ 331.975074][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 331.986747][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[]) [ 332.015312][T18391] XFS (loop4): unknown mount option [fowner=00000000000000000000]. [ 332.191216][T18402] XFS (loop5): Invalid superblock magic number [ 332.365107][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 332.370962][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 332.376777][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 332.382510][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xfa80}], 0x1}}], 0x1, 0x0, 0x0) 09:56:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:27 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) 09:56:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[]) [ 332.525089][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 332.525120][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 332.530897][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 332.613948][T18423] XFS (loop4): unknown mount option [fowner=00000000000000000000]. [ 332.674590][T18426] XFS (loop1): Invalid superblock magic number 09:56:28 executing program 0: socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) 09:56:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 332.815719][T18436] XFS (loop5): Invalid superblock magic number 09:56:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 332.877749][T18458] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noalign='noalign'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) 09:56:28 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) [ 333.102984][T18473] XFS (loop4): unknown mount option [fowner=00000000000000000000]. [ 333.161439][T18477] XFS (loop1): Invalid superblock magic number 09:56:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1fa80}], 0x1}}], 0x1, 0x0, 0x0) 09:56:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[]) 09:56:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}, {@dont_appraise='dont_appraise'}]}) [ 333.468908][T18494] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 333.614117][T18501] XFS (loop5): Invalid superblock magic number 09:56:29 executing program 0: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) 09:56:29 executing program 1: syz_mount_image$xfs(0x0, &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) 09:56:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}]}) 09:56:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 333.727720][T18521] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}]}) 09:56:29 executing program 1: syz_mount_image$xfs(0x0, &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) [ 333.949893][T18540] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x2fa80}], 0x1}}], 0x1, 0x0, 0x0) 09:56:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) 09:56:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:29 executing program 1: syz_mount_image$xfs(0x0, &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) [ 334.457495][T18563] XFS (loop4): Invalid superblock magic number [ 334.496891][T18559] XFS (loop5): Invalid superblock magic number 09:56:29 executing program 0: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) 09:56:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:29 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) 09:56:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:30 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) 09:56:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) [ 334.998951][T18618] XFS (loop5): Invalid superblock magic number 09:56:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x3fa80}], 0x1}}], 0x1, 0x0, 0x0) 09:56:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}], [{@fowner_eq={'fowner'}}, {@pcr={'pcr', 0x3d, 0x37}}]}) 09:56:30 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}, {@swidth={'swidth'}}]}) 09:56:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 335.376112][T18636] XFS (loop4): unknown mount option [fowner=00000000000000000000]. 09:56:30 executing program 0: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) 09:56:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) 09:56:30 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:56:30 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x3f00, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}}], 0x1, 0x0, 0x0) [ 335.607939][T18653] XFS (loop5): Invalid superblock magic number 09:56:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 335.651283][T18662] XFS (loop1): Invalid superblock magic number 09:56:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x4fa80}], 0x1}}], 0x1, 0x0, 0x0) 09:56:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,norecovery,discard,nobarr']) 09:56:31 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:56:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 336.262547][T18701] XFS (loop5): unknown mount option [nobarr]. 09:56:31 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) 09:56:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 336.410965][T18700] XFS (loop1): Invalid superblock magic number 09:56:31 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 336.497335][T18723] XFS (loop5): Invalid superblock magic number 09:56:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 336.562319][T18742] FAULT_INJECTION: forcing a failure. [ 336.562319][T18742] name failslab, interval 1, probability 0, space 0, times 0 [ 336.590999][T18742] CPU: 0 PID: 18742 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 336.600128][T18742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 09:56:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 336.610185][T18742] Call Trace: [ 336.613487][T18742] dump_stack+0x172/0x1f0 [ 336.617833][T18742] should_fail.cold+0xa/0x15 [ 336.622448][T18742] ? fault_create_debugfs_attr+0x180/0x180 [ 336.628263][T18742] ? page_to_nid.part.0+0x20/0x20 [ 336.633290][T18742] ? ___might_sleep+0x163/0x280 [ 336.638143][T18742] __should_failslab+0x121/0x190 [ 336.643078][T18742] should_failslab+0x9/0x14 [ 336.647579][T18742] __kmalloc+0x2e0/0x770 [ 336.651831][T18742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 336.658074][T18742] ? fput_many+0x12c/0x1a0 [ 336.662495][T18742] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 336.668739][T18742] ? strnlen_user+0x1ed/0x2e0 [ 336.673432][T18742] ? __x64_sys_memfd_create+0x13c/0x470 [ 336.678987][T18742] __x64_sys_memfd_create+0x13c/0x470 [ 336.684360][T18742] ? switch_fpu_return+0x1fa/0x4f0 [ 336.689470][T18742] ? memfd_fcntl+0x18c0/0x18c0 [ 336.694237][T18742] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 336.700307][T18742] ? trace_hardirqs_off_caller+0x65/0x230 [ 336.706010][T18742] ? trace_hardirqs_on+0x67/0x240 [ 336.711064][T18742] do_syscall_64+0xfa/0x760 [ 336.715574][T18742] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.721456][T18742] RIP: 0033:0x459829 [ 336.725343][T18742] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.744944][T18742] RSP: 002b:00007f38b7c3aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 336.753341][T18742] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 336.761290][T18742] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 336.769243][T18742] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 336.777206][T18742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b7c3b6d4 [ 336.785154][T18742] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x5fa80}], 0x1}}], 0x1, 0x0, 0x0) 09:56:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:32 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:32 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:56:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) [ 337.132117][T18763] FAULT_INJECTION: forcing a failure. [ 337.132117][T18763] name failslab, interval 1, probability 0, space 0, times 0 [ 337.151974][T18763] CPU: 1 PID: 18763 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 337.161112][T18763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.171159][T18763] Call Trace: [ 337.174444][T18763] dump_stack+0x172/0x1f0 [ 337.174478][T18763] should_fail.cold+0xa/0x15 [ 337.183368][T18763] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.183388][T18763] ? fault_create_debugfs_attr+0x180/0x180 [ 337.183411][T18763] ? page_to_nid.part.0+0x20/0x20 [ 337.200265][T18763] ? ___might_sleep+0x163/0x280 [ 337.205165][T18763] __should_failslab+0x121/0x190 [ 337.210109][T18763] ? shmem_destroy_inode+0x80/0x80 [ 337.215223][T18763] should_failslab+0x9/0x14 [ 337.219735][T18763] kmem_cache_alloc+0x2aa/0x710 [ 337.224584][T18763] ? __alloc_fd+0x487/0x620 [ 337.224599][T18763] ? __kasan_check_read+0x11/0x20 [ 337.224616][T18763] ? shmem_destroy_inode+0x80/0x80 [ 337.224635][T18763] shmem_alloc_inode+0x1c/0x50 [ 337.234147][T18763] alloc_inode+0x68/0x1e0 [ 337.234162][T18763] new_inode_pseudo+0x19/0xf0 [ 337.234175][T18763] new_inode+0x1f/0x40 [ 337.234200][T18763] shmem_get_inode+0x84/0x7e0 [ 337.261756][T18763] __shmem_file_setup.part.0+0x7e/0x2b0 [ 337.267326][T18763] shmem_file_setup+0x66/0x90 [ 337.272017][T18763] __x64_sys_memfd_create+0x2a2/0x470 [ 337.272033][T18763] ? memfd_fcntl+0x18c0/0x18c0 [ 337.272050][T18763] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 337.272073][T18763] ? trace_hardirqs_off_caller+0x65/0x230 [ 337.293960][T18763] ? trace_hardirqs_on+0x67/0x240 [ 337.298994][T18763] do_syscall_64+0xfa/0x760 [ 337.303523][T18763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.309424][T18763] RIP: 0033:0x459829 [ 337.313324][T18763] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.332937][T18763] RSP: 002b:00007f38b7c3aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 337.341352][T18763] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 337.349333][T18763] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 337.357312][T18763] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 337.365273][T18763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b7c3b6d4 [ 337.365542][T18765] XFS (loop1): Invalid superblock magic number 09:56:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:32 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 337.373239][T18763] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 337.388824][T18766] XFS (loop5): Invalid superblock magic number 09:56:32 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 337.490461][T18796] FAULT_INJECTION: forcing a failure. [ 337.490461][T18796] name failslab, interval 1, probability 0, space 0, times 0 [ 337.506864][T18796] CPU: 1 PID: 18796 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 337.516000][T18796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.526061][T18796] Call Trace: [ 337.529364][T18796] dump_stack+0x172/0x1f0 [ 337.533708][T18796] should_fail.cold+0xa/0x15 09:56:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 337.538301][T18796] ? fault_create_debugfs_attr+0x180/0x180 [ 337.544109][T18796] ? page_to_nid.part.0+0x20/0x20 [ 337.550644][T18796] ? ___might_sleep+0x163/0x280 [ 337.555496][T18796] __should_failslab+0x121/0x190 [ 337.560440][T18796] should_failslab+0x9/0x14 [ 337.564952][T18796] kmem_cache_alloc+0x2aa/0x710 [ 337.569805][T18796] ? lock_acquire+0x190/0x410 [ 337.574491][T18796] ? current_time+0x6b/0x140 [ 337.579090][T18796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.585338][T18796] ? timespec64_trunc+0xf0/0x180 09:56:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 337.590284][T18796] __d_alloc+0x2e/0x8c0 [ 337.594453][T18796] d_alloc_pseudo+0x1e/0x70 [ 337.598966][T18796] alloc_file_pseudo+0xe2/0x280 [ 337.603826][T18796] ? alloc_file+0x4d0/0x4d0 [ 337.608342][T18796] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 337.614595][T18796] __shmem_file_setup.part.0+0x108/0x2b0 [ 337.620242][T18796] shmem_file_setup+0x66/0x90 [ 337.624930][T18796] __x64_sys_memfd_create+0x2a2/0x470 [ 337.630296][T18796] ? memfd_fcntl+0x18c0/0x18c0 [ 337.630312][T18796] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 337.630327][T18796] ? trace_hardirqs_off_caller+0x65/0x230 [ 337.630341][T18796] ? trace_hardirqs_on+0x67/0x240 [ 337.630359][T18796] do_syscall_64+0xfa/0x760 [ 337.630381][T18796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.662282][T18796] RIP: 0033:0x459829 [ 337.666179][T18796] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:56:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 337.685786][T18796] RSP: 002b:00007f38b7c3aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 337.694208][T18796] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 337.702206][T18796] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 337.710177][T18796] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 337.718142][T18796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b7c3b6d4 [ 337.718150][T18796] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x6fa80}], 0x1}}], 0x1, 0x0, 0x0) 09:56:33 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) 09:56:33 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}]}) 09:56:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 338.173629][T18831] FAULT_INJECTION: forcing a failure. [ 338.173629][T18831] name failslab, interval 1, probability 0, space 0, times 0 [ 338.238586][T18827] XFS (loop1): Invalid superblock magic number [ 338.250752][T18830] XFS (loop5): Invalid superblock magic number [ 338.260648][T18831] CPU: 0 PID: 18831 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 338.269775][T18831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.280011][T18831] Call Trace: [ 338.283311][T18831] dump_stack+0x172/0x1f0 [ 338.287655][T18831] should_fail.cold+0xa/0x15 [ 338.292251][T18831] ? __kasan_check_read+0x11/0x20 [ 338.297286][T18831] ? fault_create_debugfs_attr+0x180/0x180 [ 338.303111][T18831] ? page_to_nid.part.0+0x20/0x20 [ 338.308140][T18831] ? ___might_sleep+0x163/0x280 [ 338.313005][T18831] __should_failslab+0x121/0x190 [ 338.317953][T18831] should_failslab+0x9/0x14 [ 338.322456][T18831] kmem_cache_alloc+0x2aa/0x710 [ 338.327335][T18831] ? rwlock_bug.part.0+0x90/0x90 [ 338.332307][T18831] ? __d_instantiate+0x82/0x470 [ 338.337158][T18831] ? lock_downgrade+0x920/0x920 [ 338.337174][T18831] __alloc_file+0x27/0x340 [ 338.337189][T18831] alloc_empty_file+0x72/0x170 [ 338.337202][T18831] alloc_file+0x5e/0x4d0 [ 338.337223][T18831] alloc_file_pseudo+0x189/0x280 [ 338.360371][T18831] ? alloc_file+0x4d0/0x4d0 [ 338.360391][T18831] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 338.360424][T18831] __shmem_file_setup.part.0+0x108/0x2b0 [ 338.371137][T18831] shmem_file_setup+0x66/0x90 [ 338.381431][T18831] __x64_sys_memfd_create+0x2a2/0x470 [ 338.386809][T18831] ? memfd_fcntl+0x18c0/0x18c0 [ 338.391579][T18831] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 338.391598][T18831] ? trace_hardirqs_off_caller+0x65/0x230 [ 338.391613][T18831] ? trace_hardirqs_on+0x67/0x240 [ 338.391636][T18831] do_syscall_64+0xfa/0x760 [ 338.412901][T18831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.412913][T18831] RIP: 0033:0x459829 09:56:33 executing program 0: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 338.412929][T18831] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.412936][T18831] RSP: 002b:00007f38b7c3aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 338.412957][T18831] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 338.442579][T18831] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 338.442587][T18831] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 338.442594][T18831] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b7c3b6d4 09:56:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 338.442601][T18831] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:33 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 338.619700][T18874] FAULT_INJECTION: forcing a failure. [ 338.619700][T18874] name failslab, interval 1, probability 0, space 0, times 0 [ 338.632935][T18874] CPU: 0 PID: 18874 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 338.642056][T18874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.652112][T18874] Call Trace: [ 338.655420][T18874] dump_stack+0x172/0x1f0 [ 338.659752][T18874] should_fail.cold+0xa/0x15 [ 338.664446][T18874] ? fault_create_debugfs_attr+0x180/0x180 [ 338.670254][T18874] ? page_to_nid.part.0+0x20/0x20 [ 338.675258][T18874] ? ___might_sleep+0x163/0x280 [ 338.680096][T18874] __should_failslab+0x121/0x190 [ 338.685021][T18874] should_failslab+0x9/0x14 [ 338.689506][T18874] kmem_cache_alloc+0x2aa/0x710 [ 338.694334][T18874] ? memcg_kmem_put_cache+0x3e/0x50 [ 338.699512][T18874] ? kmem_cache_alloc+0x314/0x710 [ 338.704535][T18874] security_file_alloc+0x39/0x170 [ 338.709553][T18874] __alloc_file+0xde/0x340 [ 338.713950][T18874] alloc_empty_file+0x72/0x170 [ 338.718695][T18874] alloc_file+0x5e/0x4d0 [ 338.722919][T18874] alloc_file_pseudo+0x189/0x280 [ 338.727834][T18874] ? alloc_file+0x4d0/0x4d0 [ 338.732320][T18874] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 338.738540][T18874] __shmem_file_setup.part.0+0x108/0x2b0 [ 338.744152][T18874] shmem_file_setup+0x66/0x90 [ 338.749168][T18874] __x64_sys_memfd_create+0x2a2/0x470 [ 338.754532][T18874] ? memfd_fcntl+0x18c0/0x18c0 [ 338.759280][T18874] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 338.765327][T18874] ? trace_hardirqs_off_caller+0x65/0x230 [ 338.771024][T18874] ? trace_hardirqs_on+0x67/0x240 [ 338.776030][T18874] do_syscall_64+0xfa/0x760 [ 338.780515][T18874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.786382][T18874] RIP: 0033:0x459829 [ 338.790255][T18874] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.809849][T18874] RSP: 002b:00007f38b7c3aa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 338.818258][T18874] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 338.826267][T18874] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 338.834230][T18874] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 338.842185][T18874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f38b7c3b6d4 [ 338.850153][T18874] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x7fa80}], 0x1}}], 0x1, 0x0, 0x0) 09:56:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:34 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce,']) 09:56:34 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}]}) 09:56:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 339.069077][T18882] FAULT_INJECTION: forcing a failure. [ 339.069077][T18882] name failslab, interval 1, probability 0, space 0, times 0 [ 339.081862][T18882] CPU: 1 PID: 18882 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 339.090983][T18882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.101039][T18882] Call Trace: [ 339.104339][T18882] dump_stack+0x172/0x1f0 [ 339.108692][T18882] should_fail.cold+0xa/0x15 [ 339.113283][T18882] ? fault_create_debugfs_attr+0x180/0x180 [ 339.119069][T18882] ? unwind_get_return_address+0x61/0xa0 [ 339.124683][T18882] ? profile_setup.cold+0xbb/0xbb [ 339.129686][T18882] ? ___might_sleep+0x163/0x280 [ 339.134519][T18882] __should_failslab+0x121/0x190 [ 339.139438][T18882] should_failslab+0x9/0x14 [ 339.143921][T18882] __kmalloc+0x2e0/0x770 [ 339.148143][T18882] ? mark_held_locks+0xf0/0xf0 [ 339.152885][T18882] ? stack_trace_save+0xac/0xe0 [ 339.157722][T18882] ? stack_trace_consume_entry+0x190/0x190 [ 339.163507][T18882] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 339.169294][T18882] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 339.174999][T18882] tomoyo_realpath_from_path+0xcd/0x7b0 [ 339.180533][T18882] ? tomoyo_path_perm+0x1cb/0x430 [ 339.185545][T18882] tomoyo_path_perm+0x230/0x430 [ 339.190382][T18882] ? tomoyo_path_perm+0x1cb/0x430 [ 339.195392][T18882] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 339.201440][T18882] ? __fget+0x35d/0x560 [ 339.205582][T18882] ? __kasan_check_read+0x11/0x20 [ 339.210593][T18882] ? __kasan_check_read+0x11/0x20 [ 339.215597][T18882] ? __fget+0xa3/0x560 [ 339.219650][T18882] ? lock_acquire+0x190/0x410 [ 339.224303][T18882] ? do_sys_ftruncate+0x282/0x550 [ 339.229307][T18882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.235531][T18882] tomoyo_path_truncate+0x1d/0x30 [ 339.240539][T18882] security_path_truncate+0xf2/0x150 [ 339.245815][T18882] do_sys_ftruncate+0x3d9/0x550 [ 339.250655][T18882] __x64_sys_ftruncate+0x59/0x80 [ 339.255599][T18882] do_syscall_64+0xfa/0x760 [ 339.260084][T18882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.265962][T18882] RIP: 0033:0x4597f7 [ 339.269855][T18882] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.289628][T18882] RSP: 002b:00007f38b7c3aa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 339.298017][T18882] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 339.305975][T18882] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 09:56:34 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) [ 339.313932][T18882] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 339.321884][T18882] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 339.329847][T18882] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 339.339580][T18882] ERROR: Out of memory at tomoyo_realpath_from_path. 09:56:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 339.474758][T18885] XFS (loop5): Invalid superblock magic number [ 339.494022][T18882] XFS (loop4): Invalid superblock magic number 09:56:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 339.535601][T18907] XFS (loop1): Invalid superblock magic number 09:56:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x40007b00}], 0x1}}], 0x1, 0x0, 0x0) 09:56:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) 09:56:35 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@discard='discard'}]}) 09:56:35 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 340.278524][T18958] FAULT_INJECTION: forcing a failure. [ 340.278524][T18958] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 340.291758][T18958] CPU: 1 PID: 18958 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 340.300869][T18958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.310936][T18958] Call Trace: [ 340.314240][T18958] dump_stack+0x172/0x1f0 [ 340.318573][T18958] should_fail.cold+0xa/0x15 [ 340.323158][T18958] ? fault_create_debugfs_attr+0x180/0x180 [ 340.328963][T18958] ? is_bpf_text_address+0xac/0x170 [ 340.334511][T18958] ? __kasan_check_read+0x11/0x20 [ 340.339546][T18958] should_fail_alloc_page+0x50/0x60 [ 340.344751][T18958] __alloc_pages_nodemask+0x1a1/0x900 [ 340.350127][T18958] ? __bpf_address_lookup+0x310/0x310 [ 340.355502][T18958] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 340.355519][T18958] ? __alloc_pages_slowpath+0x2530/0x2530 [ 340.355540][T18958] ? kernel_text_address+0x73/0xf0 [ 340.355556][T18958] ? fault_create_debugfs_attr+0x180/0x180 09:56:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 340.355571][T18958] cache_grow_begin+0x90/0xd20 [ 340.355587][T18958] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 340.355601][T18958] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 340.355623][T18958] __kmalloc+0x6b2/0x770 [ 340.367055][T18958] ? mark_held_locks+0xf0/0xf0 [ 340.403645][T18958] ? stack_trace_save+0xac/0xe0 [ 340.408509][T18958] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 340.414243][T18958] tomoyo_realpath_from_path+0xcd/0x7b0 [ 340.419792][T18958] ? tomoyo_path_perm+0x1cb/0x430 [ 340.424825][T18958] tomoyo_path_perm+0x230/0x430 [ 340.429678][T18958] ? tomoyo_path_perm+0x1cb/0x430 [ 340.434714][T18958] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 340.436480][T18961] XFS (loop1): Invalid superblock magic number [ 340.440778][T18958] ? __fget+0x35d/0x560 [ 340.440793][T18958] ? __kasan_check_read+0x11/0x20 [ 340.440807][T18958] ? __kasan_check_read+0x11/0x20 [ 340.440824][T18958] ? __fget+0xa3/0x560 [ 340.440858][T18958] ? lock_acquire+0x190/0x410 [ 340.469871][T18958] ? do_sys_ftruncate+0x282/0x550 [ 340.469895][T18958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.481140][T18958] tomoyo_path_truncate+0x1d/0x30 [ 340.481159][T18958] security_path_truncate+0xf2/0x150 [ 340.481176][T18958] do_sys_ftruncate+0x3d9/0x550 [ 340.481201][T18958] __x64_sys_ftruncate+0x59/0x80 [ 340.501240][T18958] do_syscall_64+0xfa/0x760 [ 340.505756][T18958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.511645][T18958] RIP: 0033:0x4597f7 [ 340.515533][T18958] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.535127][T18958] RSP: 002b:00007f38b7c3aa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 340.543519][T18958] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 340.551485][T18958] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 340.555185][T18960] XFS (loop5): Invalid superblock magic number [ 340.559463][T18958] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 09:56:35 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) 09:56:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 340.559471][T18958] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 340.559480][T18958] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x300}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x2}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 340.681689][T18958] XFS (loop4): Invalid superblock magic number [ 340.688056][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 340.688103][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 340.688184][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 340.688218][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x4}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 340.925094][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 340.925125][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 340.930906][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 09:56:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x5}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:36 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@logbufs={'logbufs'}}, {@swidth={'swidth'}}]}) 09:56:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) 09:56:36 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x500}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 341.194919][T19029] FAULT_INJECTION: forcing a failure. [ 341.194919][T19029] name failslab, interval 1, probability 0, space 0, times 0 [ 341.230700][T19029] CPU: 0 PID: 19029 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 341.239838][T19029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.249981][T19029] Call Trace: [ 341.253286][T19029] dump_stack+0x172/0x1f0 [ 341.257635][T19029] should_fail.cold+0xa/0x15 [ 341.262236][T19029] ? __kasan_check_read+0x11/0x20 [ 341.267271][T19029] ? fault_create_debugfs_attr+0x180/0x180 [ 341.273083][T19029] ? __kasan_check_write+0x14/0x20 [ 341.278198][T19029] ? lock_downgrade+0x920/0x920 [ 341.283056][T19029] ? ___might_sleep+0x163/0x280 [ 341.287908][T19029] __should_failslab+0x121/0x190 [ 341.287924][T19029] should_failslab+0x9/0x14 [ 341.287936][T19029] __kmalloc+0x2e0/0x770 [ 341.287960][T19029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.307831][T19029] ? simple_dname+0xd1/0x1f0 [ 341.312436][T19029] ? tomoyo_encode2.part.0+0xf5/0x400 [ 341.317817][T19029] tomoyo_encode2.part.0+0xf5/0x400 [ 341.323108][T19029] tomoyo_encode+0x2b/0x50 [ 341.327527][T19029] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 341.333169][T19029] ? tomoyo_path_perm+0x1cb/0x430 [ 341.338201][T19029] tomoyo_path_perm+0x230/0x430 [ 341.343141][T19029] ? tomoyo_path_perm+0x1cb/0x430 [ 341.348173][T19029] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 341.354243][T19029] ? __fget+0x35d/0x560 [ 341.358406][T19029] ? __kasan_check_read+0x11/0x20 [ 341.363456][T19029] ? __kasan_check_read+0x11/0x20 [ 341.368474][T19029] ? __fget+0xa3/0x560 [ 341.372550][T19029] ? lock_acquire+0x190/0x410 [ 341.377226][T19029] ? do_sys_ftruncate+0x282/0x550 [ 341.382252][T19029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.388496][T19029] tomoyo_path_truncate+0x1d/0x30 [ 341.393521][T19029] security_path_truncate+0xf2/0x150 [ 341.398813][T19029] do_sys_ftruncate+0x3d9/0x550 [ 341.405853][T19029] __x64_sys_ftruncate+0x59/0x80 [ 341.410799][T19029] do_syscall_64+0xfa/0x760 [ 341.415318][T19029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.421210][T19029] RIP: 0033:0x4597f7 [ 341.425090][T19029] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.444677][T19029] RSP: 002b:00007f38b7c3aa88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 341.453084][T19029] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 341.461057][T19029] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 341.469025][T19029] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 341.476982][T19029] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 341.484941][T19029] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:36 executing program 0: socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) 09:56:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x4000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 341.495136][T19029] ERROR: Out of memory at tomoyo_realpath_from_path. [ 341.532891][T19030] XFS (loop5): Invalid superblock magic number 09:56:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x40000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x1000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 341.558508][T19029] XFS (loop4): Invalid superblock magic number [ 341.582544][T19031] XFS (loop1): Invalid superblock magic number 09:56:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x2000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x5000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x2}}], 0x1, 0x0, 0x0) 09:56:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x40000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) 09:56:37 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:37 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 342.108046][T19104] FAULT_INJECTION: forcing a failure. [ 342.108046][T19104] name failslab, interval 1, probability 0, space 0, times 0 [ 342.130120][T19104] CPU: 1 PID: 19104 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 342.139258][T19104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.149405][T19104] Call Trace: [ 342.152708][T19104] dump_stack+0x172/0x1f0 [ 342.157052][T19104] should_fail.cold+0xa/0x15 [ 342.161662][T19104] ? fault_create_debugfs_attr+0x180/0x180 [ 342.167475][T19104] ? page_to_nid.part.0+0x20/0x20 [ 342.172498][T19104] ? ___might_sleep+0x163/0x280 [ 342.172516][T19104] __should_failslab+0x121/0x190 [ 342.172538][T19104] should_failslab+0x9/0x14 [ 342.186797][T19104] kmem_cache_alloc+0x2aa/0x710 [ 342.191652][T19104] ? __kasan_check_write+0x14/0x20 [ 342.196769][T19104] ? up_write+0x155/0x490 [ 342.201105][T19104] getname_flags+0xd6/0x5b0 09:56:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0xf5ffffff}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 342.205619][T19104] getname+0x1a/0x20 [ 342.209523][T19104] do_sys_open+0x2c9/0x5d0 [ 342.213950][T19104] ? filp_open+0x80/0x80 [ 342.218201][T19104] ? switch_fpu_return+0x1fa/0x4f0 [ 342.223320][T19104] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 342.229396][T19104] __x64_sys_open+0x7e/0xc0 [ 342.233915][T19104] do_syscall_64+0xfa/0x760 [ 342.238439][T19104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.244331][T19104] RIP: 0033:0x413711 [ 342.248237][T19104] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 342.267843][T19104] RSP: 002b:00007f38b7c3aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 342.276259][T19104] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 342.284239][T19104] RDX: 00007f38b7c3ab0a RSI: 0000000000000002 RDI: 00007f38b7c3ab00 [ 342.292234][T19104] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 342.300209][T19104] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 342.308170][T19104] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 342.327968][T19097] XFS (loop1): Invalid superblock magic number [ 342.336027][T19102] XFS (loop5): Invalid superblock magic number 09:56:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0xfffffff5}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:37 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 342.431379][T19129] FAULT_INJECTION: forcing a failure. [ 342.431379][T19129] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 342.444606][T19129] CPU: 1 PID: 19129 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 342.453793][T19129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.463844][T19129] Call Trace: [ 342.463868][T19129] dump_stack+0x172/0x1f0 [ 342.463889][T19129] should_fail.cold+0xa/0x15 09:56:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x4000000000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 342.463917][T19129] ? fault_create_debugfs_attr+0x180/0x180 [ 342.463940][T19129] ? rwlock_bug.part.0+0x90/0x90 [ 342.486837][T19129] ? current_time+0x6b/0x140 [ 342.491440][T19129] should_fail_alloc_page+0x50/0x60 [ 342.496630][T19129] __alloc_pages_nodemask+0x1a1/0x900 [ 342.501992][T19129] ? __kasan_check_read+0x11/0x20 [ 342.507015][T19129] ? __alloc_pages_slowpath+0x2530/0x2530 [ 342.512731][T19129] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 342.518361][T19129] ? __kasan_check_read+0x11/0x20 [ 342.523389][T19129] ? fault_create_debugfs_attr+0x180/0x180 [ 342.529196][T19129] cache_grow_begin+0x90/0xd20 [ 342.533966][T19129] ? getname_flags+0xd6/0x5b0 [ 342.538658][T19129] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 342.544915][T19129] kmem_cache_alloc+0x64e/0x710 [ 342.549773][T19129] ? __kasan_check_write+0x14/0x20 [ 342.554904][T19129] getname_flags+0xd6/0x5b0 [ 342.559421][T19129] getname+0x1a/0x20 [ 342.563323][T19129] do_sys_open+0x2c9/0x5d0 [ 342.567746][T19129] ? filp_open+0x80/0x80 [ 342.571993][T19129] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 342.578239][T19129] ? fput+0x1b/0x20 09:56:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x100000000000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 342.582053][T19129] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 342.588129][T19129] __x64_sys_open+0x7e/0xc0 [ 342.592635][T19129] do_syscall_64+0xfa/0x760 [ 342.597142][T19129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.603035][T19129] RIP: 0033:0x413711 [ 342.606940][T19129] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 342.626555][T19129] RSP: 002b:00007f38b7c3aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 342.626569][T19129] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 342.626576][T19129] RDX: 00007f38b7c3ab0a RSI: 0000000000000002 RDI: 00007f38b7c3ab00 [ 342.626583][T19129] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 342.626590][T19129] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 342.626596][T19129] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 342.626805][ C1] protocol 88fb is buggy, dev hsr_slave_0 09:56:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x200000000000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 342.651085][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 342.718289][T19129] XFS (loop4): Invalid superblock magic number [ 342.765065][ C1] protocol 88fb is buggy, dev hsr_slave_0 09:56:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x8}}], 0x1, 0x0, 0x0) 09:56:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x500000000000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:38 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@swidth={'swidth'}}]}) 09:56:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,']) 09:56:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x4000000000000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:38 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 343.142135][T19163] XFS (loop5): Invalid superblock magic number [ 343.167127][T19190] FAULT_INJECTION: forcing a failure. [ 343.167127][T19190] name failslab, interval 1, probability 0, space 0, times 0 [ 343.180718][T19166] XFS (loop1): Invalid superblock magic number [ 343.180748][T19190] CPU: 1 PID: 19190 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 343.196012][T19190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.206081][T19190] Call Trace: [ 343.209353][T19190] dump_stack+0x172/0x1f0 [ 343.213664][T19190] should_fail.cold+0xa/0x15 [ 343.218235][T19190] ? is_bpf_text_address+0xd3/0x170 [ 343.223416][T19190] ? fault_create_debugfs_attr+0x180/0x180 [ 343.229203][T19190] ? page_to_nid.part.0+0x20/0x20 [ 343.234206][T19190] ? ___might_sleep+0x163/0x280 [ 343.239093][T19190] __should_failslab+0x121/0x190 [ 343.244013][T19190] should_failslab+0x9/0x14 [ 343.248506][T19190] kmem_cache_alloc+0x2aa/0x710 [ 343.253353][T19190] ? stack_trace_save+0xac/0xe0 [ 343.258183][T19190] ? stack_trace_consume_entry+0x190/0x190 [ 343.263992][T19190] __alloc_file+0x27/0x340 [ 343.268395][T19190] alloc_empty_file+0x72/0x170 [ 343.273142][T19190] path_openat+0xef/0x4630 [ 343.277549][T19190] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 343.283343][T19190] ? kasan_slab_alloc+0xf/0x20 [ 343.288092][T19190] ? kmem_cache_alloc+0x121/0x710 [ 343.293111][T19190] ? getname_flags+0xd6/0x5b0 [ 343.297768][T19190] ? getname+0x1a/0x20 [ 343.301811][T19190] ? do_sys_open+0x2c9/0x5d0 [ 343.306374][T19190] ? __x64_sys_open+0x7e/0xc0 [ 343.311028][T19190] ? do_syscall_64+0xfa/0x760 [ 343.315695][T19190] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.321751][T19190] ? __isolate_free_page+0x4c0/0x4c0 [ 343.327031][T19190] ? __kasan_check_read+0x11/0x20 [ 343.332037][T19190] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 343.337396][T19190] ? __kasan_check_read+0x11/0x20 [ 343.342415][T19190] ? __alloc_pages_nodemask+0x578/0x900 [ 343.347937][T19190] ? cache_grow_end+0xa4/0x190 [ 343.352938][T19190] ? __kasan_check_read+0x11/0x20 [ 343.357943][T19190] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 343.363641][T19190] do_filp_open+0x1a1/0x280 [ 343.368125][T19190] ? may_open_dev+0x100/0x100 [ 343.372784][T19190] ? lock_downgrade+0x920/0x920 [ 343.377619][T19190] ? rwlock_bug.part.0+0x90/0x90 [ 343.382544][T19190] ? __alloc_fd+0x35/0x620 [ 343.386965][T19190] ? __kasan_check_read+0x11/0x20 [ 343.391968][T19190] ? do_raw_spin_unlock+0x57/0x270 [ 343.397068][T19190] ? _raw_spin_unlock+0x2d/0x50 [ 343.406004][T19190] ? __alloc_fd+0x487/0x620 [ 343.410500][T19190] do_sys_open+0x3fe/0x5d0 [ 343.414895][T19190] ? filp_open+0x80/0x80 [ 343.419131][T19190] ? switch_fpu_return+0x1fa/0x4f0 [ 343.424226][T19190] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 343.430271][T19190] __x64_sys_open+0x7e/0xc0 [ 343.434755][T19190] do_syscall_64+0xfa/0x760 [ 343.439895][T19190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.445772][T19190] RIP: 0033:0x413711 [ 343.449644][T19190] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 343.469225][T19190] RSP: 002b:00007f38b7c3aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 343.477620][T19190] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 343.485598][T19190] RDX: 00007f38b7c3ab0a RSI: 0000000000000002 RDI: 00007f38b7c3ab00 [ 343.493563][T19190] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 343.501511][T19190] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 343.509460][T19190] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0xf5ffffff00000000}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:38 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 343.600221][T19197] FAULT_INJECTION: forcing a failure. [ 343.600221][T19197] name failslab, interval 1, probability 0, space 0, times 0 [ 343.618037][T19197] CPU: 0 PID: 19197 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 343.627159][T19197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.637205][T19197] Call Trace: [ 343.640478][T19197] dump_stack+0x172/0x1f0 [ 343.644799][T19197] should_fail.cold+0xa/0x15 [ 343.649634][T19197] ? fault_create_debugfs_attr+0x180/0x180 [ 343.655429][T19197] ? page_to_nid.part.0+0x20/0x20 [ 343.660458][T19197] ? ___might_sleep+0x163/0x280 [ 343.665302][T19197] __should_failslab+0x121/0x190 [ 343.670227][T19197] should_failslab+0x9/0x14 [ 343.674739][T19197] kmem_cache_alloc+0x2aa/0x710 [ 343.679588][T19197] ? memcg_kmem_put_cache+0x3e/0x50 [ 343.684806][T19197] ? kmem_cache_alloc+0x314/0x710 [ 343.689829][T19197] security_file_alloc+0x39/0x170 [ 343.694842][T19197] __alloc_file+0xde/0x340 [ 343.699266][T19197] alloc_empty_file+0x72/0x170 [ 343.704015][T19197] path_openat+0xef/0x4630 [ 343.708427][T19197] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 343.714221][T19197] ? kasan_slab_alloc+0xf/0x20 [ 343.718977][T19197] ? kmem_cache_alloc+0x121/0x710 [ 343.723978][T19197] ? getname_flags+0xd6/0x5b0 [ 343.728643][T19197] ? getname+0x1a/0x20 [ 343.732706][T19197] ? do_sys_open+0x2c9/0x5d0 [ 343.737269][T19197] ? __x64_sys_open+0x7e/0xc0 [ 343.741933][T19197] ? do_syscall_64+0xfa/0x760 [ 343.746622][T19197] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.752669][T19197] ? __isolate_free_page+0x4c0/0x4c0 [ 343.757935][T19197] ? __kasan_check_read+0x11/0x20 [ 343.762952][T19197] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 343.768320][T19197] ? __kasan_check_read+0x11/0x20 [ 343.773329][T19197] ? __alloc_pages_nodemask+0x578/0x900 [ 343.778861][T19197] ? cache_grow_end+0xa4/0x190 [ 343.783628][T19197] ? __kasan_check_read+0x11/0x20 [ 343.788658][T19197] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 343.788674][T19197] do_filp_open+0x1a1/0x280 [ 343.788689][T19197] ? may_open_dev+0x100/0x100 [ 343.788711][T19197] ? lock_downgrade+0x920/0x920 [ 343.798935][T19197] ? rwlock_bug.part.0+0x90/0x90 [ 343.808430][T19197] ? __alloc_fd+0x35/0x620 [ 343.808448][T19197] ? __kasan_check_read+0x11/0x20 [ 343.808461][T19197] ? do_raw_spin_unlock+0x57/0x270 [ 343.808476][T19197] ? _raw_spin_unlock+0x2d/0x50 [ 343.808497][T19197] ? __alloc_fd+0x487/0x620 [ 343.837256][T19197] do_sys_open+0x3fe/0x5d0 [ 343.841686][T19197] ? filp_open+0x80/0x80 [ 343.845941][T19197] ? switch_fpu_return+0x1fa/0x4f0 [ 343.851061][T19197] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 343.857136][T19197] __x64_sys_open+0x7e/0xc0 [ 343.861660][T19197] do_syscall_64+0xfa/0x760 [ 343.866175][T19197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.872153][T19197] RIP: 0033:0x413711 [ 343.876043][T19197] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 09:56:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x10}}], 0x1, 0x0, 0x0) 09:56:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 343.876051][T19197] RSP: 002b:00007f38b7c3aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 343.876073][T19197] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 343.904243][T19197] RDX: 00007f38b7c3ab0a RSI: 0000000000000002 RDI: 00007f38b7c3ab00 [ 343.904252][T19197] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 343.904260][T19197] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 343.904268][T19197] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:39 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 344.059448][T19220] FAULT_INJECTION: forcing a failure. [ 344.059448][T19220] name failslab, interval 1, probability 0, space 0, times 0 [ 344.073481][T19220] CPU: 0 PID: 19220 Comm: syz-executor.4 Not tainted 5.3.0-rc3-next-20190809 #63 [ 344.082599][T19220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.092655][T19220] Call Trace: [ 344.095952][T19220] dump_stack+0x172/0x1f0 [ 344.100322][T19220] should_fail.cold+0xa/0x15 [ 344.104923][T19220] ? fault_create_debugfs_attr+0x180/0x180 [ 344.110736][T19220] ? ___might_sleep+0x163/0x280 [ 344.115596][T19220] __should_failslab+0x121/0x190 [ 344.120531][T19220] should_failslab+0x9/0x14 [ 344.125098][T19220] __kmalloc+0x2e0/0x770 [ 344.129320][T19220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.135536][T19220] ? d_absolute_path+0x11b/0x170 [ 344.140452][T19220] ? __d_path+0x140/0x140 [ 344.144771][T19220] ? tomoyo_encode2.part.0+0xf5/0x400 [ 344.150135][T19220] tomoyo_encode2.part.0+0xf5/0x400 [ 344.155319][T19220] tomoyo_encode+0x2b/0x50 [ 344.159714][T19220] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 344.165325][T19220] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 344.171547][T19220] tomoyo_check_open_permission+0x2a8/0x3f0 [ 344.177460][T19220] ? tomoyo_path_number_perm+0x520/0x520 [ 344.183087][T19220] ? lock_downgrade+0x920/0x920 [ 344.187937][T19220] ? rwlock_bug.part.0+0x90/0x90 [ 344.192963][T19220] ? lockref_get+0x16/0x60 [ 344.197361][T19220] tomoyo_file_open+0xa9/0xd0 [ 344.202022][T19220] security_file_open+0x71/0x300 [ 344.206940][T19220] do_dentry_open+0x373/0x1250 [ 344.211683][T19220] ? match_exception_partial+0x242/0x2d0 [ 344.217301][T19220] ? chown_common+0x5c0/0x5c0 [ 344.221960][T19220] ? inode_permission+0xb4/0x560 [ 344.226901][T19220] vfs_open+0xa0/0xd0 [ 344.230869][T19220] path_openat+0x10e9/0x4630 [ 344.235444][T19220] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 344.241226][T19220] ? kasan_slab_alloc+0xf/0x20 [ 344.245965][T19220] ? kmem_cache_alloc+0x121/0x710 [ 344.250966][T19220] ? getname_flags+0xd6/0x5b0 [ 344.255640][T19220] ? getname+0x1a/0x20 [ 344.259688][T19220] ? do_sys_open+0x2c9/0x5d0 [ 344.264261][T19220] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 344.269627][T19220] ? shmem_setattr+0x4c7/0xc80 [ 344.274375][T19220] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 344.279986][T19220] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 344.285686][T19220] do_filp_open+0x1a1/0x280 [ 344.290166][T19220] ? may_open_dev+0x100/0x100 [ 344.294824][T19220] ? __kasan_check_read+0x11/0x20 [ 344.299824][T19220] ? do_raw_spin_unlock+0x57/0x270 [ 344.304918][T19220] ? _raw_spin_unlock+0x2d/0x50 [ 344.309746][T19220] ? __alloc_fd+0x487/0x620 [ 344.314229][T19220] do_sys_open+0x3fe/0x5d0 [ 344.318710][T19220] ? filp_open+0x80/0x80 [ 344.322936][T19220] ? switch_fpu_return+0x1fa/0x4f0 [ 344.328027][T19220] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 344.334070][T19220] __x64_sys_open+0x7e/0xc0 [ 344.338568][T19220] do_syscall_64+0xfa/0x760 [ 344.343056][T19220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.348927][T19220] RIP: 0033:0x413711 [ 344.352810][T19220] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 344.372416][T19220] RSP: 002b:00007f38b7c3aa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 344.380816][T19220] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 344.388779][T19220] RDX: 00007f38b7c3ab0a RSI: 0000000000000002 RDI: 00007f38b7c3ab00 [ 344.396728][T19220] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 09:56:39 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@swidth={'swidth'}}]}) 09:56:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,']) [ 344.404676][T19220] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 344.412626][T19220] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 344.425119][T19220] ERROR: Out of memory at tomoyo_realpath_from_path. 09:56:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 344.728239][T19220] XFS (loop4): Invalid superblock magic number [ 344.740652][T19239] XFS (loop1): Invalid superblock magic number [ 344.764698][T19244] XFS (loop5): Invalid superblock magic number 09:56:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x34}}], 0x1, 0x0, 0x0) 09:56:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:40 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@swalloc='swalloc'}, {@swidth={'swidth'}}]}) 09:56:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,']) [ 345.257253][T19294] XFS (loop1): Invalid superblock magic number [ 345.283629][T19292] XFS (loop4): Invalid superblock magic number [ 345.299159][T19312] XFS (loop5): Invalid superblock magic number 09:56:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1f00}}], 0x1, 0x0, 0x0) 09:56:41 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoen']) 09:56:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='%fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 345.870542][T19363] XFS (loop5): unknown mount option [pqnoen]. [ 345.888112][T19346] XFS (loop1): Invalid superblock magic number 09:56:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoen']) 09:56:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 346.139740][T19379] XFS (loop5): unknown mount option [pqnoen]. 09:56:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='\\fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:41 executing program 1: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]) [ 346.470742][T19396] XFS (loop1): Invalid superblock magic number 09:56:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x7}}], 0x1, 0x0, 0x0) 09:56:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoen']) 09:56:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x%s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:42 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 346.764756][T19429] XFS (loop5): unknown mount option [pqnoen]. [ 346.775054][ C1] net_ratelimit: 19 callbacks suppressed [ 346.775061][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 346.786552][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenfor']) [ 346.924262][T19449] FAULT_INJECTION: forcing a failure. [ 346.924262][T19449] name failslab, interval 1, probability 0, space 0, times 0 [ 346.945054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 346.950926][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 346.956937][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 346.962724][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 346.978339][T19449] CPU: 0 PID: 19449 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 346.987467][T19449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.997529][T19449] Call Trace: [ 347.000832][T19449] dump_stack+0x172/0x1f0 [ 347.000856][T19449] should_fail.cold+0xa/0x15 [ 347.000879][T19449] ? fault_create_debugfs_attr+0x180/0x180 [ 347.000907][T19449] ? page_to_nid.part.0+0x20/0x20 [ 347.009886][T19449] ? ___might_sleep+0x163/0x280 [ 347.009906][T19449] __should_failslab+0x121/0x190 [ 347.009922][T19449] should_failslab+0x9/0x14 [ 347.009934][T19449] __kmalloc+0x2e0/0x770 [ 347.009958][T19449] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 347.045470][T19449] ? fput_many+0x12c/0x1a0 [ 347.049876][T19449] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.056107][T19449] ? strnlen_user+0x1ed/0x2e0 [ 347.060798][T19449] ? __x64_sys_memfd_create+0x13c/0x470 [ 347.066334][T19449] __x64_sys_memfd_create+0x13c/0x470 [ 347.071858][T19449] ? switch_fpu_return+0x1fa/0x4f0 [ 347.078193][T19449] ? memfd_fcntl+0x18c0/0x18c0 [ 347.082947][T19449] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 347.089000][T19449] ? trace_hardirqs_off_caller+0x65/0x230 [ 347.094720][T19449] ? trace_hardirqs_on+0x67/0x240 [ 347.099751][T19449] do_syscall_64+0xfa/0x760 [ 347.104239][T19449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.110111][T19449] RIP: 0033:0x459829 [ 347.113985][T19449] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.133579][T19449] RSP: 002b:00007fde78aa0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 347.141995][T19449] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 347.149950][T19449] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 347.157924][T19449] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 347.165912][T19449] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fde78aa16d4 [ 347.173903][T19449] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 347.182086][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 347.185177][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 347.187879][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 347.193612][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:42 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x.s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 347.261295][T19454] XFS (loop5): unknown mount option [pqnoenfor]. [ 347.351593][T19464] FAULT_INJECTION: forcing a failure. [ 347.351593][T19464] name failslab, interval 1, probability 0, space 0, times 0 [ 347.379530][T19464] CPU: 1 PID: 19464 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 347.388666][T19464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.398721][T19464] Call Trace: [ 347.402010][T19464] dump_stack+0x172/0x1f0 [ 347.406442][T19464] should_fail.cold+0xa/0x15 [ 347.411140][T19464] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.417189][T19464] ? fault_create_debugfs_attr+0x180/0x180 [ 347.422994][T19464] ? page_to_nid.part.0+0x20/0x20 [ 347.427999][T19464] ? ___might_sleep+0x163/0x280 [ 347.432833][T19464] __should_failslab+0x121/0x190 [ 347.440171][T19464] ? shmem_destroy_inode+0x80/0x80 [ 347.445286][T19464] should_failslab+0x9/0x14 [ 347.449789][T19464] kmem_cache_alloc+0x2aa/0x710 [ 347.454656][T19464] ? __alloc_fd+0x487/0x620 [ 347.459148][T19464] ? __kasan_check_read+0x11/0x20 [ 347.464152][T19464] ? shmem_destroy_inode+0x80/0x80 [ 347.469261][T19464] shmem_alloc_inode+0x1c/0x50 [ 347.474007][T19464] alloc_inode+0x68/0x1e0 [ 347.478319][T19464] new_inode_pseudo+0x19/0xf0 [ 347.482975][T19464] new_inode+0x1f/0x40 [ 347.487026][T19464] shmem_get_inode+0x84/0x7e0 [ 347.491684][T19464] __shmem_file_setup.part.0+0x7e/0x2b0 [ 347.497210][T19464] shmem_file_setup+0x66/0x90 09:56:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x10}}], 0x1, 0x0, 0x0) 09:56:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 347.501880][T19464] __x64_sys_memfd_create+0x2a2/0x470 [ 347.507276][T19464] ? memfd_fcntl+0x18c0/0x18c0 [ 347.512052][T19464] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 347.518123][T19464] ? trace_hardirqs_off_caller+0x65/0x230 [ 347.523850][T19464] ? trace_hardirqs_on+0x67/0x240 [ 347.528876][T19464] do_syscall_64+0xfa/0x760 [ 347.533373][T19464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.539241][T19464] RIP: 0033:0x459829 [ 347.543115][T19464] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.562701][T19464] RSP: 002b:00007fde78aa0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 347.571095][T19464] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 347.579046][T19464] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 347.587006][T19464] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 347.594977][T19464] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fde78aa16d4 [ 347.602944][T19464] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenfor']) 09:56:43 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 347.855546][T19487] XFS (loop5): unknown mount option [pqnoenfor]. [ 347.863129][T19491] FAULT_INJECTION: forcing a failure. [ 347.863129][T19491] name failslab, interval 1, probability 0, space 0, times 0 [ 347.892639][T19491] CPU: 0 PID: 19491 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 09:56:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 347.901771][T19491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.911816][T19491] Call Trace: [ 347.915114][T19491] dump_stack+0x172/0x1f0 [ 347.919460][T19491] should_fail.cold+0xa/0x15 [ 347.924066][T19491] ? fault_create_debugfs_attr+0x180/0x180 [ 347.929874][T19491] ? page_to_nid.part.0+0x20/0x20 [ 347.934899][T19491] ? ___might_sleep+0x163/0x280 [ 347.939762][T19491] __should_failslab+0x121/0x190 [ 347.944681][T19491] should_failslab+0x9/0x14 [ 347.949163][T19491] kmem_cache_alloc+0x2aa/0x710 [ 347.954004][T19491] ? lock_acquire+0x190/0x410 [ 347.958675][T19491] ? current_time+0x6b/0x140 [ 347.963271][T19491] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.969508][T19491] ? timespec64_trunc+0xf0/0x180 [ 347.974442][T19491] __d_alloc+0x2e/0x8c0 [ 347.978578][T19491] d_alloc_pseudo+0x1e/0x70 [ 347.983079][T19491] alloc_file_pseudo+0xe2/0x280 [ 347.987957][T19491] ? alloc_file+0x4d0/0x4d0 [ 347.992463][T19491] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 347.998687][T19491] __shmem_file_setup.part.0+0x108/0x2b0 [ 348.004318][T19491] shmem_file_setup+0x66/0x90 [ 348.009005][T19491] __x64_sys_memfd_create+0x2a2/0x470 [ 348.014381][T19491] ? memfd_fcntl+0x18c0/0x18c0 [ 348.019164][T19491] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 348.025213][T19491] ? trace_hardirqs_off_caller+0x65/0x230 [ 348.030925][T19491] ? trace_hardirqs_on+0x67/0x240 [ 348.035946][T19491] do_syscall_64+0xfa/0x760 [ 348.040452][T19491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.046320][T19491] RIP: 0033:0x459829 [ 348.050195][T19491] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.069787][T19491] RSP: 002b:00007fde78aa0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 348.078183][T19491] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 348.086150][T19491] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 348.094121][T19491] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 09:56:43 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x/s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 348.102084][T19491] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fde78aa16d4 [ 348.110065][T19491] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 348.252950][T19503] FAULT_INJECTION: forcing a failure. [ 348.252950][T19503] name failslab, interval 1, probability 0, space 0, times 0 [ 348.269623][T19503] CPU: 1 PID: 19503 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 348.278749][T19503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.288805][T19503] Call Trace: [ 348.288832][T19503] dump_stack+0x172/0x1f0 [ 348.288851][T19503] should_fail.cold+0xa/0x15 [ 348.288867][T19503] ? __kasan_check_read+0x11/0x20 [ 348.288891][T19503] ? fault_create_debugfs_attr+0x180/0x180 [ 348.311884][T19503] ? page_to_nid.part.0+0x20/0x20 [ 348.316926][T19503] ? ___might_sleep+0x163/0x280 [ 348.321793][T19503] __should_failslab+0x121/0x190 [ 348.326774][T19503] should_failslab+0x9/0x14 [ 348.326788][T19503] kmem_cache_alloc+0x2aa/0x710 [ 348.326801][T19503] ? rwlock_bug.part.0+0x90/0x90 [ 348.326815][T19503] ? __d_instantiate+0x82/0x470 [ 348.326830][T19503] ? lock_downgrade+0x920/0x920 [ 348.326851][T19503] __alloc_file+0x27/0x340 [ 348.336190][T19503] alloc_empty_file+0x72/0x170 [ 348.336204][T19503] alloc_file+0x5e/0x4d0 [ 348.336219][T19503] alloc_file_pseudo+0x189/0x280 [ 348.336234][T19503] ? alloc_file+0x4d0/0x4d0 [ 348.336257][T19503] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 348.379858][T19503] __shmem_file_setup.part.0+0x108/0x2b0 [ 348.385499][T19503] shmem_file_setup+0x66/0x90 [ 348.385517][T19503] __x64_sys_memfd_create+0x2a2/0x470 [ 348.385532][T19503] ? memfd_fcntl+0x18c0/0x18c0 09:56:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 348.385556][T19503] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 348.412289][T19503] ? trace_hardirqs_off_caller+0x65/0x230 [ 348.418020][T19503] ? trace_hardirqs_on+0x67/0x240 [ 348.418038][T19503] do_syscall_64+0xfa/0x760 [ 348.418057][T19503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.418067][T19503] RIP: 0033:0x459829 09:56:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 348.418089][T19503] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.457211][T19503] RSP: 002b:00007fde78aa0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 348.465633][T19503] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 348.473620][T19503] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 348.481604][T19503] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 348.489577][T19503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fde78aa16d4 09:56:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenfor']) [ 348.497565][T19503] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x700}}], 0x1, 0x0, 0x0) 09:56:43 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 348.648080][T19527] XFS (loop5): unknown mount option [pqnoenfor]. 09:56:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 348.694690][T19539] FAULT_INJECTION: forcing a failure. [ 348.694690][T19539] name failslab, interval 1, probability 0, space 0, times 0 [ 348.726466][T19539] CPU: 1 PID: 19539 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 09:56:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x>s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 348.735601][T19539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.745655][T19539] Call Trace: [ 348.748955][T19539] dump_stack+0x172/0x1f0 [ 348.753302][T19539] should_fail.cold+0xa/0x15 [ 348.757895][T19539] ? fault_create_debugfs_attr+0x180/0x180 [ 348.763688][T19539] ? page_to_nid.part.0+0x20/0x20 [ 348.768703][T19539] ? ___might_sleep+0x163/0x280 [ 348.773544][T19539] __should_failslab+0x121/0x190 [ 348.778462][T19539] should_failslab+0x9/0x14 [ 348.782944][T19539] kmem_cache_alloc+0x2aa/0x710 [ 348.787782][T19539] ? memcg_kmem_put_cache+0x3e/0x50 [ 348.792979][T19539] ? kmem_cache_alloc+0x314/0x710 [ 348.797986][T19539] security_file_alloc+0x39/0x170 [ 348.802992][T19539] __alloc_file+0xde/0x340 [ 348.807400][T19539] alloc_empty_file+0x72/0x170 [ 348.812160][T19539] alloc_file+0x5e/0x4d0 [ 348.816400][T19539] alloc_file_pseudo+0x189/0x280 [ 348.821316][T19539] ? alloc_file+0x4d0/0x4d0 [ 348.825814][T19539] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 348.832045][T19539] __shmem_file_setup.part.0+0x108/0x2b0 [ 348.837658][T19539] shmem_file_setup+0x66/0x90 [ 348.842332][T19539] __x64_sys_memfd_create+0x2a2/0x470 [ 348.847711][T19539] ? memfd_fcntl+0x18c0/0x18c0 [ 348.852468][T19539] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 348.858516][T19539] ? trace_hardirqs_off_caller+0x65/0x230 [ 348.864213][T19539] ? trace_hardirqs_on+0x67/0x240 [ 348.869221][T19539] do_syscall_64+0xfa/0x760 [ 348.873708][T19539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.879580][T19539] RIP: 0033:0x459829 [ 348.883474][T19539] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.903077][T19539] RSP: 002b:00007fde78aa0a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 348.911465][T19539] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 348.919417][T19539] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 348.927377][T19539] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 348.935336][T19539] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fde78aa16d4 09:56:44 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 348.943304][T19539] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 349.054238][T19549] FAULT_INJECTION: forcing a failure. [ 349.054238][T19549] name failslab, interval 1, probability 0, space 0, times 0 [ 349.082995][T19549] CPU: 1 PID: 19549 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 349.092133][T19549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.102186][T19549] Call Trace: [ 349.105486][T19549] dump_stack+0x172/0x1f0 [ 349.109827][T19549] should_fail.cold+0xa/0x15 [ 349.114520][T19549] ? fault_create_debugfs_attr+0x180/0x180 [ 349.120341][T19549] ? unwind_get_return_address+0x61/0xa0 [ 349.125977][T19549] ? profile_setup.cold+0xbb/0xbb [ 349.131006][T19549] ? ___might_sleep+0x163/0x280 [ 349.135862][T19549] __should_failslab+0x121/0x190 [ 349.135879][T19549] should_failslab+0x9/0x14 [ 349.135891][T19549] __kmalloc+0x2e0/0x770 [ 349.135904][T19549] ? mark_held_locks+0xf0/0xf0 09:56:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 349.135935][T19549] ? stack_trace_save+0xac/0xe0 [ 349.149585][T19549] ? stack_trace_consume_entry+0x190/0x190 [ 349.149601][T19549] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 349.149622][T19549] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 349.176492][T19549] tomoyo_realpath_from_path+0xcd/0x7b0 [ 349.182040][T19549] ? tomoyo_path_perm+0x1cb/0x430 [ 349.187074][T19549] tomoyo_path_perm+0x230/0x430 [ 349.191933][T19549] ? tomoyo_path_perm+0x1cb/0x430 [ 349.196966][T19549] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 349.203035][T19549] ? __fget+0x35d/0x560 [ 349.207194][T19549] ? __kasan_check_read+0x11/0x20 [ 349.212221][T19549] ? __kasan_check_read+0x11/0x20 [ 349.217255][T19549] ? __fget+0xa3/0x560 [ 349.221351][T19549] ? lock_acquire+0x190/0x410 [ 349.226051][T19549] ? do_sys_ftruncate+0x282/0x550 [ 349.231087][T19549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.237336][T19549] tomoyo_path_truncate+0x1d/0x30 [ 349.242368][T19549] security_path_truncate+0xf2/0x150 [ 349.247665][T19549] do_sys_ftruncate+0x3d9/0x550 [ 349.252524][T19549] __x64_sys_ftruncate+0x59/0x80 [ 349.257465][T19549] do_syscall_64+0xfa/0x760 [ 349.261980][T19549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.267869][T19549] RIP: 0033:0x4597f7 [ 349.271770][T19549] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.291388][T19549] RSP: 002b:00007fde78aa0a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d 09:56:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 349.299893][T19549] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 349.307870][T19549] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 349.307878][T19549] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 349.307886][T19549] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 349.307893][T19549] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 349.325946][T19549] ERROR: Out of memory at tomoyo_realpath_from_path. 09:56:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x1f00}}], 0x1, 0x0, 0x0) [ 349.457995][T19562] XFS (loop5): Invalid superblock magic number [ 349.473788][T19549] XFS (loop1): Invalid superblock magic number 09:56:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x\\s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:45 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforc']) 09:56:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x\xc4s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 349.862973][T19618] FAULT_INJECTION: forcing a failure. [ 349.862973][T19618] name failslab, interval 1, probability 0, space 0, times 0 [ 349.885081][T19618] CPU: 0 PID: 19618 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 349.894212][T19618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.904262][T19618] Call Trace: [ 349.907612][T19618] dump_stack+0x172/0x1f0 [ 349.911930][T19618] should_fail.cold+0xa/0x15 [ 349.916500][T19618] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 349.921942][T19618] ? fault_create_debugfs_attr+0x180/0x180 [ 349.927744][T19618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.933967][T19618] ? should_fail+0x1de/0x852 [ 349.938537][T19618] ? ___might_sleep+0x163/0x280 [ 349.943369][T19618] __should_failslab+0x121/0x190 [ 349.948285][T19618] should_failslab+0x9/0x14 [ 349.952765][T19618] __kmalloc+0x2e0/0x770 [ 349.957010][T19618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.963245][T19618] ? simple_dname+0xd1/0x1f0 [ 349.967814][T19618] ? tomoyo_encode2.part.0+0xf5/0x400 [ 349.973163][T19618] tomoyo_encode2.part.0+0xf5/0x400 [ 349.978343][T19618] ? stack_trace_consume_entry+0x190/0x190 [ 349.984154][T19618] tomoyo_encode+0x2b/0x50 [ 349.988569][T19618] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 349.994178][T19618] ? tomoyo_path_perm+0x1cb/0x430 [ 349.999202][T19618] tomoyo_path_perm+0x230/0x430 [ 350.004034][T19618] ? tomoyo_path_perm+0x1cb/0x430 [ 350.009035][T19618] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 350.015078][T19618] ? __fget+0x35d/0x560 [ 350.019212][T19618] ? __kasan_check_read+0x11/0x20 [ 350.024213][T19618] ? __kasan_check_read+0x11/0x20 [ 350.029213][T19618] ? __fget+0xa3/0x560 [ 350.033268][T19618] ? lock_acquire+0x190/0x410 [ 350.037924][T19618] ? do_sys_ftruncate+0x282/0x550 [ 350.042929][T19618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.049173][T19618] tomoyo_path_truncate+0x1d/0x30 [ 350.054181][T19618] security_path_truncate+0xf2/0x150 [ 350.059462][T19618] do_sys_ftruncate+0x3d9/0x550 [ 350.064305][T19618] __x64_sys_ftruncate+0x59/0x80 [ 350.069237][T19618] do_syscall_64+0xfa/0x760 [ 350.073724][T19618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 350.079591][T19618] RIP: 0033:0x4597f7 [ 350.083466][T19618] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 350.103048][T19618] RSP: 002b:00007fde78aa0a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 350.111442][T19618] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 350.119397][T19618] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 350.127360][T19618] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 350.135310][T19618] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 350.143262][T19618] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 350.155618][T19618] ERROR: Out of memory at tomoyo_realpath_from_path. [ 350.220180][T19622] XFS (loop5): unknown mount option [pqnoenforc]. 09:56:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 350.262104][T19618] XFS (loop1): Invalid superblock magic number 09:56:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:56:45 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforc']) 09:56:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x3f00}}], 0x1, 0x0, 0x0) 09:56:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='x\xe6s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x2, 0x0, @mcast1}}}, 0xff6a) 09:56:45 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 350.660002][T19659] XFS (loop5): unknown mount option [pqnoenforc]. 09:56:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x4, 0x0, @mcast1}}}, 0xff6a) [ 350.704908][T19676] FAULT_INJECTION: forcing a failure. [ 350.704908][T19676] name failslab, interval 1, probability 0, space 0, times 0 [ 350.730961][T19676] CPU: 0 PID: 19676 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 350.740096][T19676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.750160][T19676] Call Trace: [ 350.753468][T19676] dump_stack+0x172/0x1f0 [ 350.757803][T19676] should_fail.cold+0xa/0x15 [ 350.762377][T19676] ? __kasan_check_read+0x11/0x20 [ 350.767389][T19676] ? fault_create_debugfs_attr+0x180/0x180 [ 350.773192][T19676] ? __kasan_check_write+0x14/0x20 [ 350.778303][T19676] ? lock_downgrade+0x920/0x920 [ 350.783147][T19676] ? ___might_sleep+0x163/0x280 [ 350.787994][T19676] __should_failslab+0x121/0x190 [ 350.792915][T19676] should_failslab+0x9/0x14 [ 350.797396][T19676] __kmalloc+0x2e0/0x770 [ 350.801626][T19676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.807845][T19676] ? simple_dname+0xd1/0x1f0 [ 350.812420][T19676] ? tomoyo_encode2.part.0+0xf5/0x400 [ 350.817771][T19676] tomoyo_encode2.part.0+0xf5/0x400 [ 350.822951][T19676] tomoyo_encode+0x2b/0x50 [ 350.827353][T19676] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 350.832961][T19676] ? tomoyo_path_perm+0x1cb/0x430 [ 350.837971][T19676] tomoyo_path_perm+0x230/0x430 [ 350.842801][T19676] ? tomoyo_path_perm+0x1cb/0x430 [ 350.847814][T19676] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 350.853874][T19676] ? __fget+0x35d/0x560 [ 350.858009][T19676] ? __kasan_check_read+0x11/0x20 [ 350.863016][T19676] ? __kasan_check_read+0x11/0x20 [ 350.868044][T19676] ? __fget+0xa3/0x560 [ 350.872099][T19676] ? lock_acquire+0x190/0x410 [ 350.876754][T19676] ? do_sys_ftruncate+0x282/0x550 [ 350.881761][T19676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.887997][T19676] tomoyo_path_truncate+0x1d/0x30 [ 350.893011][T19676] security_path_truncate+0xf2/0x150 [ 350.898299][T19676] do_sys_ftruncate+0x3d9/0x550 [ 350.903133][T19676] __x64_sys_ftruncate+0x59/0x80 [ 350.908050][T19676] do_syscall_64+0xfa/0x760 [ 350.912533][T19676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 350.918416][T19676] RIP: 0033:0x4597f7 [ 350.922306][T19676] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 350.941890][T19676] RSP: 002b:00007fde78aa0a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 350.950282][T19676] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 350.958321][T19676] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 350.966273][T19676] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 350.974220][T19676] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 350.982169][T19676] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 350.991298][T19676] ERROR: Out of memory at tomoyo_realpath_from_path. 09:56:46 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforc']) 09:56:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x5, 0x0, @mcast1}}}, 0xff6a) 09:56:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf#\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 351.124407][T19676] XFS (loop1): Invalid superblock magic number [ 351.245634][T19697] XFS (loop5): unknown mount option [pqnoenforc]. 09:56:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x500, 0x0, @mcast1}}}, 0xff6a) 09:56:46 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r1) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x2b1, 0x0) 09:56:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x4000, 0x0, @mcast1}}}, 0xff6a) [ 351.432272][T19718] FAULT_INJECTION: forcing a failure. [ 351.432272][T19718] name failslab, interval 1, probability 0, space 0, times 0 09:56:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x4000}}], 0x1, 0x0, 0x0) 09:56:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf%\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 351.509259][T19718] CPU: 1 PID: 19718 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 351.518743][T19718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.528795][T19718] Call Trace: [ 351.532118][T19718] dump_stack+0x172/0x1f0 [ 351.536460][T19718] should_fail.cold+0xa/0x15 [ 351.541061][T19718] ? fault_create_debugfs_attr+0x180/0x180 [ 351.548354][T19718] ? page_to_nid.part.0+0x20/0x20 [ 351.553383][T19718] ? ___might_sleep+0x163/0x280 09:56:46 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 351.558242][T19718] __should_failslab+0x121/0x190 [ 351.563186][T19718] should_failslab+0x9/0x14 [ 351.567689][T19718] __kmalloc+0x2e0/0x770 [ 351.571938][T19718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 351.578187][T19718] ? fput_many+0x12c/0x1a0 [ 351.582605][T19718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 351.588850][T19718] ? strnlen_user+0x1ed/0x2e0 [ 351.593535][T19718] ? __x64_sys_memfd_create+0x13c/0x470 [ 351.599087][T19718] __x64_sys_memfd_create+0x13c/0x470 [ 351.604459][T19718] ? memfd_fcntl+0x18c0/0x18c0 [ 351.609314][T19718] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 351.615389][T19718] ? trace_hardirqs_off_caller+0x65/0x230 [ 351.619291][T19729] FAULT_INJECTION: forcing a failure. [ 351.619291][T19729] name failslab, interval 1, probability 0, space 0, times 0 [ 351.621110][T19718] ? trace_hardirqs_on+0x67/0x240 [ 351.621131][T19718] do_syscall_64+0xfa/0x760 [ 351.621159][T19718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.649109][T19718] RIP: 0033:0x459829 [ 351.653001][T19718] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.672603][T19718] RSP: 002b:00007f277c1ada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 351.681019][T19718] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 351.688993][T19718] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 351.697056][T19718] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 351.705049][T19718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f277c1ae6d4 [ 351.713022][T19718] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 351.754622][T19729] CPU: 0 PID: 19729 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 351.763790][T19729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.773857][T19729] Call Trace: [ 351.777151][T19729] dump_stack+0x172/0x1f0 [ 351.781484][T19729] should_fail.cold+0xa/0x15 [ 351.786070][T19729] ? is_bpf_text_address+0xd3/0x170 [ 351.791278][T19729] ? fault_create_debugfs_attr+0x180/0x180 [ 351.797110][T19729] ? page_to_nid.part.0+0x20/0x20 [ 351.797132][T19729] ? ___might_sleep+0x163/0x280 [ 351.807006][T19729] __should_failslab+0x121/0x190 [ 351.807025][T19729] should_failslab+0x9/0x14 [ 351.807044][T19729] kmem_cache_alloc+0x2aa/0x710 [ 351.821304][T19729] ? stack_trace_save+0xac/0xe0 [ 351.826174][T19729] ? stack_trace_consume_entry+0x190/0x190 [ 351.831992][T19729] __alloc_file+0x27/0x340 [ 351.836416][T19729] alloc_empty_file+0x72/0x170 [ 351.841165][T19729] path_openat+0xef/0x4630 [ 351.845582][T19729] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 351.851391][T19729] ? kasan_slab_alloc+0xf/0x20 [ 351.856137][T19729] ? kmem_cache_alloc+0x121/0x710 [ 351.861142][T19729] ? getname_flags+0xd6/0x5b0 [ 351.865798][T19729] ? getname+0x1a/0x20 [ 351.869893][T19729] ? do_sys_open+0x2c9/0x5d0 [ 351.874483][T19729] ? __x64_sys_open+0x7e/0xc0 [ 351.879154][T19729] ? do_syscall_64+0xfa/0x760 [ 351.883814][T19729] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.889859][T19729] ? lock_downgrade+0x920/0x920 [ 351.894693][T19729] ? current_time+0x6b/0x140 [ 351.899268][T19729] ? __kasan_check_read+0x11/0x20 [ 351.904281][T19729] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 351.909635][T19729] ? shmem_setattr+0x4c7/0xc80 [ 351.914378][T19729] ? __kasan_check_read+0x11/0x20 [ 351.919386][T19729] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 351.925022][T19729] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 351.930729][T19729] do_filp_open+0x1a1/0x280 [ 351.935217][T19729] ? may_open_dev+0x100/0x100 [ 351.939876][T19729] ? lock_downgrade+0x920/0x920 [ 351.944706][T19729] ? rwlock_bug.part.0+0x90/0x90 [ 351.949626][T19729] ? __alloc_fd+0x35/0x620 [ 351.954025][T19729] ? __kasan_check_read+0x11/0x20 [ 351.959028][T19729] ? do_raw_spin_unlock+0x57/0x270 [ 351.964149][T19729] ? _raw_spin_unlock+0x2d/0x50 [ 351.968995][T19729] ? __alloc_fd+0x487/0x620 [ 351.973481][T19729] do_sys_open+0x3fe/0x5d0 [ 351.977876][T19729] ? filp_open+0x80/0x80 [ 351.982097][T19729] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 351.988314][T19729] ? fput+0x1b/0x20 [ 351.992102][T19729] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 351.998152][T19729] __x64_sys_open+0x7e/0xc0 [ 352.002637][T19729] do_syscall_64+0xfa/0x760 [ 352.007124][T19729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.012994][T19729] RIP: 0033:0x413711 [ 352.016868][T19729] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 352.036471][T19729] RSP: 002b:00007fde78aa0a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 352.044881][T19729] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 09:56:47 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x40000, 0x0, @mcast1}}}, 0xff6a) 09:56:47 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r1) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x2b1, 0x0) [ 352.052878][T19729] RDX: 00007fde78aa0b0a RSI: 0000000000000002 RDI: 00007fde78aa0b00 [ 352.060835][T19729] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 352.068792][T19729] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 352.076750][T19729] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:47 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 352.178685][T19747] FAULT_INJECTION: forcing a failure. [ 352.178685][T19747] name failslab, interval 1, probability 0, space 0, times 0 [ 352.207800][T19747] CPU: 0 PID: 19747 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 352.216942][T19747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 09:56:47 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x1000000, 0x0, @mcast1}}}, 0xff6a) [ 352.227184][T19747] Call Trace: [ 352.230474][T19747] dump_stack+0x172/0x1f0 [ 352.234816][T19747] should_fail.cold+0xa/0x15 [ 352.239426][T19747] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.245503][T19747] ? fault_create_debugfs_attr+0x180/0x180 [ 352.251329][T19747] ? page_to_nid.part.0+0x20/0x20 [ 352.256374][T19747] ? ___might_sleep+0x163/0x280 [ 352.261237][T19747] __should_failslab+0x121/0x190 [ 352.266270][T19747] ? shmem_destroy_inode+0x80/0x80 [ 352.271400][T19747] should_failslab+0x9/0x14 09:56:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf*\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 352.275922][T19747] kmem_cache_alloc+0x2aa/0x710 [ 352.280776][T19747] ? __alloc_fd+0x487/0x620 [ 352.285283][T19747] ? __kasan_check_read+0x11/0x20 [ 352.290314][T19747] ? shmem_destroy_inode+0x80/0x80 [ 352.295436][T19747] shmem_alloc_inode+0x1c/0x50 [ 352.300205][T19747] alloc_inode+0x68/0x1e0 [ 352.304548][T19747] new_inode_pseudo+0x19/0xf0 [ 352.309224][T19747] new_inode+0x1f/0x40 [ 352.313302][T19747] shmem_get_inode+0x84/0x7e0 [ 352.317974][T19747] __shmem_file_setup.part.0+0x7e/0x2b0 [ 352.323780][T19747] shmem_file_setup+0x66/0x90 [ 352.328446][T19747] __x64_sys_memfd_create+0x2a2/0x470 [ 352.333801][T19747] ? memfd_fcntl+0x18c0/0x18c0 [ 352.338549][T19747] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 352.344599][T19747] ? trace_hardirqs_off_caller+0x65/0x230 [ 352.350298][T19747] ? trace_hardirqs_on+0x67/0x240 [ 352.355306][T19747] do_syscall_64+0xfa/0x760 [ 352.359811][T19747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.365683][T19747] RIP: 0033:0x459829 09:56:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x40000}}], 0x1, 0x0, 0x0) [ 352.369577][T19747] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.389164][T19747] RSP: 002b:00007f277c1ada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 352.397564][T19747] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 352.405607][T19747] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 352.413572][T19747] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 352.421546][T19747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f277c1ae6d4 09:56:47 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 352.429528][T19747] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 352.450815][T19757] FAULT_INJECTION: forcing a failure. [ 352.450815][T19757] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 352.464050][T19757] CPU: 0 PID: 19757 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190809 #63 [ 352.473171][T19757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.483225][T19757] Call Trace: [ 352.486501][T19757] dump_stack+0x172/0x1f0 [ 352.490819][T19757] should_fail.cold+0xa/0x15 [ 352.495392][T19757] ? fault_create_debugfs_attr+0x180/0x180 [ 352.501181][T19757] ? rwlock_bug.part.0+0x90/0x90 [ 352.506098][T19757] ? current_time+0x6b/0x140 [ 352.510673][T19757] should_fail_alloc_page+0x50/0x60 [ 352.515854][T19757] __alloc_pages_nodemask+0x1a1/0x900 [ 352.521207][T19757] ? __kasan_check_read+0x11/0x20 [ 352.526210][T19757] ? __alloc_pages_slowpath+0x2530/0x2530 [ 352.531918][T19757] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 352.537538][T19757] ? __kasan_check_read+0x11/0x20 [ 352.542556][T19757] ? fault_create_debugfs_attr+0x180/0x180 [ 352.548347][T19757] cache_grow_begin+0x90/0xd20 [ 352.553101][T19757] ? getname_flags+0xd6/0x5b0 [ 352.557764][T19757] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.563990][T19757] kmem_cache_alloc+0x64e/0x710 [ 352.568829][T19757] ? __kasan_check_write+0x14/0x20 [ 352.573928][T19757] getname_flags+0xd6/0x5b0 [ 352.578445][T19757] getname+0x1a/0x20 [ 352.582326][T19757] do_sys_open+0x2c9/0x5d0 [ 352.586728][T19757] ? filp_open+0x80/0x80 [ 352.590957][T19757] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 352.597199][T19757] ? fput+0x1b/0x20 [ 352.600996][T19757] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 352.607140][T19757] __x64_sys_open+0x7e/0xc0 [ 352.611630][T19757] do_syscall_64+0xfa/0x760 [ 352.616117][T19757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.621990][T19757] RIP: 0033:0x413711 [ 352.625957][T19757] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 352.645561][T19757] RSP: 002b:00007fde78aa0a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 352.653978][T19757] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000413711 [ 352.661932][T19757] RDX: 00007fde78aa0b0a RSI: 0000000000000002 RDI: 00007fde78aa0b00 [ 352.669887][T19757] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 09:56:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r1) r2 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x2b1, 0x0) [ 352.677842][T19757] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 352.685792][T19757] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 352.778085][T19761] FAULT_INJECTION: forcing a failure. [ 352.778085][T19761] name failslab, interval 1, probability 0, space 0, times 0 09:56:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x2000000, 0x0, @mcast1}}}, 0xff6a) [ 352.863177][T19761] CPU: 0 PID: 19761 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 352.872323][T19761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.882477][T19761] Call Trace: [ 352.885780][T19761] dump_stack+0x172/0x1f0 [ 352.890123][T19761] should_fail.cold+0xa/0x15 [ 352.894732][T19761] ? fault_create_debugfs_attr+0x180/0x180 [ 352.900552][T19761] ? page_to_nid.part.0+0x20/0x20 [ 352.905581][T19761] ? ___might_sleep+0x163/0x280 [ 352.910450][T19761] __should_failslab+0x121/0x190 [ 352.915392][T19761] should_failslab+0x9/0x14 [ 352.919921][T19761] kmem_cache_alloc+0x2aa/0x710 [ 352.924778][T19761] ? lock_acquire+0x190/0x410 [ 352.929460][T19761] ? current_time+0x6b/0x140 [ 352.934053][T19761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.940301][T19761] ? timespec64_trunc+0xf0/0x180 [ 352.945249][T19761] __d_alloc+0x2e/0x8c0 [ 352.949423][T19761] d_alloc_pseudo+0x1e/0x70 [ 352.953942][T19761] alloc_file_pseudo+0xe2/0x280 [ 352.958801][T19761] ? alloc_file+0x4d0/0x4d0 09:56:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x5000000, 0x0, @mcast1}}}, 0xff6a) [ 352.963317][T19761] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 352.969568][T19761] __shmem_file_setup.part.0+0x108/0x2b0 [ 352.975204][T19761] shmem_file_setup+0x66/0x90 [ 352.979893][T19761] __x64_sys_memfd_create+0x2a2/0x470 [ 352.985272][T19761] ? memfd_fcntl+0x18c0/0x18c0 [ 352.990056][T19761] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 352.996133][T19761] ? trace_hardirqs_off_caller+0x65/0x230 [ 353.001856][T19761] ? trace_hardirqs_on+0x67/0x240 [ 353.006891][T19761] do_syscall_64+0xfa/0x760 [ 353.011422][T19761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.017319][T19761] RIP: 0033:0x459829 [ 353.021218][T19761] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.040833][T19761] RSP: 002b:00007f277c1ada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 353.049336][T19761] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 09:56:48 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 353.057310][T19761] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 353.065293][T19761] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 353.073270][T19761] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f277c1ae6d4 [ 353.081253][T19761] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x40000000, 0x0, @mcast1}}}, 0xff6a) 09:56:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 353.169096][T19757] XFS (loop1): Invalid superblock magic number [ 353.197274][T19803] FAULT_INJECTION: forcing a failure. [ 353.197274][T19803] name failslab, interval 1, probability 0, space 0, times 0 [ 353.210539][T19803] CPU: 0 PID: 19803 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 353.219657][T19803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.229716][T19803] Call Trace: [ 353.229740][T19803] dump_stack+0x172/0x1f0 [ 353.229768][T19803] should_fail.cold+0xa/0x15 [ 353.241944][T19803] ? __kasan_check_read+0x11/0x20 [ 353.246982][T19803] ? fault_create_debugfs_attr+0x180/0x180 [ 353.252804][T19803] ? page_to_nid.part.0+0x20/0x20 [ 353.257840][T19803] ? ___might_sleep+0x163/0x280 [ 353.257859][T19803] __should_failslab+0x121/0x190 [ 353.257874][T19803] should_failslab+0x9/0x14 [ 353.257886][T19803] kmem_cache_alloc+0x2aa/0x710 [ 353.257899][T19803] ? rwlock_bug.part.0+0x90/0x90 [ 353.257927][T19803] ? __d_instantiate+0x82/0x470 [ 353.286777][T19803] ? lock_downgrade+0x920/0x920 [ 353.291624][T19803] __alloc_file+0x27/0x340 [ 353.296040][T19803] alloc_empty_file+0x72/0x170 [ 353.300815][T19803] alloc_file+0x5e/0x4d0 [ 353.305055][T19803] alloc_file_pseudo+0x189/0x280 [ 353.309988][T19803] ? alloc_file+0x4d0/0x4d0 [ 353.314475][T19803] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 353.320701][T19803] __shmem_file_setup.part.0+0x108/0x2b0 [ 353.326316][T19803] shmem_file_setup+0x66/0x90 [ 353.330976][T19803] __x64_sys_memfd_create+0x2a2/0x470 [ 353.336334][T19803] ? memfd_fcntl+0x18c0/0x18c0 [ 353.341087][T19803] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 353.347141][T19803] ? trace_hardirqs_off_caller+0x65/0x230 [ 353.352841][T19803] ? trace_hardirqs_on+0x67/0x240 [ 353.357848][T19803] do_syscall_64+0xfa/0x760 [ 353.362338][T19803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.368207][T19803] RIP: 0033:0x459829 [ 353.372103][T19803] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.391691][T19803] RSP: 002b:00007f277c1ada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 353.400101][T19803] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 09:56:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf+\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 353.415232][T19803] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 353.423220][T19803] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 353.431193][T19803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f277c1ae6d4 [ 353.439151][T19803] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:49 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0xf5ffffff, 0x0, @mcast1}}}, 0xff6a) 09:56:49 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x100000}}], 0x1, 0x0, 0x0) [ 353.731142][T19825] FAULT_INJECTION: forcing a failure. [ 353.731142][T19825] name failslab, interval 1, probability 0, space 0, times 0 [ 353.745337][T19825] CPU: 0 PID: 19825 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 353.754455][T19825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.764527][T19825] Call Trace: [ 353.767809][T19825] dump_stack+0x172/0x1f0 [ 353.772123][T19825] should_fail.cold+0xa/0x15 [ 353.776722][T19825] ? fault_create_debugfs_attr+0x180/0x180 [ 353.782510][T19825] ? page_to_nid.part.0+0x20/0x20 [ 353.787752][T19825] ? ___might_sleep+0x163/0x280 [ 353.792586][T19825] __should_failslab+0x121/0x190 [ 353.797505][T19825] should_failslab+0x9/0x14 [ 353.801989][T19825] kmem_cache_alloc+0x2aa/0x710 [ 353.806819][T19825] ? memcg_kmem_put_cache+0x3e/0x50 [ 353.812079][T19825] ? kmem_cache_alloc+0x314/0x710 [ 353.817084][T19825] security_file_alloc+0x39/0x170 [ 353.822098][T19825] __alloc_file+0xde/0x340 [ 353.826495][T19825] alloc_empty_file+0x72/0x170 [ 353.831235][T19825] alloc_file+0x5e/0x4d0 [ 353.835472][T19825] alloc_file_pseudo+0x189/0x280 [ 353.840392][T19825] ? alloc_file+0x4d0/0x4d0 [ 353.845067][T19825] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 353.851290][T19825] __shmem_file_setup.part.0+0x108/0x2b0 [ 353.856907][T19825] shmem_file_setup+0x66/0x90 [ 353.861573][T19825] __x64_sys_memfd_create+0x2a2/0x470 [ 353.866933][T19825] ? memfd_fcntl+0x18c0/0x18c0 [ 353.871678][T19825] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 353.877754][T19825] ? trace_hardirqs_off_caller+0x65/0x230 [ 353.883472][T19825] ? trace_hardirqs_on+0x67/0x240 [ 353.888481][T19825] do_syscall_64+0xfa/0x760 [ 353.892969][T19825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 353.898839][T19825] RIP: 0033:0x459829 [ 353.902712][T19825] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.922298][T19825] RSP: 002b:00007f277c1ada88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 09:56:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0xfffffff5, 0x0, @mcast1}}}, 0xff6a) 09:56:49 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 353.930698][T19825] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459829 [ 353.938667][T19825] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be748 [ 353.946622][T19825] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 353.954574][T19825] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f277c1ae6d4 [ 353.962545][T19825] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf-\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x4000000000000, 0x0, @mcast1}}}, 0xff6a) [ 354.125071][ C1] net_ratelimit: 20 callbacks suppressed [ 354.125079][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 354.136591][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 354.177821][T19850] FAULT_INJECTION: forcing a failure. [ 354.177821][T19850] name failslab, interval 1, probability 0, space 0, times 0 [ 354.194342][T19850] CPU: 0 PID: 19850 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 354.203471][T19850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.213531][T19850] Call Trace: [ 354.216841][T19850] dump_stack+0x172/0x1f0 [ 354.221193][T19850] should_fail.cold+0xa/0x15 [ 354.225793][T19850] ? fault_create_debugfs_attr+0x180/0x180 [ 354.231605][T19850] ? unwind_get_return_address+0x61/0xa0 [ 354.237242][T19850] ? profile_setup.cold+0xbb/0xbb [ 354.238729][T19829] XFS (loop1): Invalid superblock magic number [ 354.242270][T19850] ? ___might_sleep+0x163/0x280 [ 354.242290][T19850] __should_failslab+0x121/0x190 [ 354.242307][T19850] should_failslab+0x9/0x14 [ 354.242326][T19850] __kmalloc+0x2e0/0x770 [ 354.267134][T19850] ? mark_held_locks+0xf0/0xf0 [ 354.271894][T19850] ? stack_trace_save+0xac/0xe0 [ 354.276745][T19850] ? stack_trace_consume_entry+0x190/0x190 [ 354.282534][T19850] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 354.288450][T19850] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 354.294169][T19850] tomoyo_realpath_from_path+0xcd/0x7b0 [ 354.299698][T19850] ? tomoyo_path_perm+0x1cb/0x430 [ 354.304714][T19850] tomoyo_path_perm+0x230/0x430 [ 354.309547][T19850] ? tomoyo_path_perm+0x1cb/0x430 [ 354.314556][T19850] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 354.320626][T19850] ? __fget+0x35d/0x560 [ 354.325129][T19850] ? __kasan_check_read+0x11/0x20 [ 354.330144][T19850] ? __kasan_check_read+0x11/0x20 [ 354.335255][T19850] ? __fget+0xa3/0x560 [ 354.339317][T19850] ? lock_acquire+0x190/0x410 [ 354.343979][T19850] ? do_sys_ftruncate+0x282/0x550 [ 354.353534][T19850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 354.359790][T19850] tomoyo_path_truncate+0x1d/0x30 [ 354.364822][T19850] security_path_truncate+0xf2/0x150 [ 354.370116][T19850] do_sys_ftruncate+0x3d9/0x550 [ 354.374967][T19850] __x64_sys_ftruncate+0x59/0x80 [ 354.379904][T19850] do_syscall_64+0xfa/0x760 [ 354.384398][T19850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 354.390365][T19850] RIP: 0033:0x4597f7 [ 354.394255][T19850] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 354.413839][T19850] RSP: 002b:00007f277c1ada88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d 09:56:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x100000000000000, 0x0, @mcast1}}}, 0xff6a) [ 354.422253][T19850] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 354.430207][T19850] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 354.438161][T19850] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 354.446122][T19850] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 354.454107][T19850] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 [ 354.465180][T19850] ERROR: Out of memory at tomoyo_realpath_from_path. 09:56:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf.\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x200000000000000, 0x0, @mcast1}}}, 0xff6a) [ 354.592895][T19850] XFS (loop5): Invalid superblock magic number 09:56:50 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='%fs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x500000000000000, 0x0, @mcast1}}}, 0xff6a) 09:56:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf/\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) 09:56:50 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x4000000000000000, 0x0, @mcast1}}}, 0xff6a) [ 355.055103][T19908] FAULT_INJECTION: forcing a failure. [ 355.055103][T19908] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 355.068431][T19908] CPU: 0 PID: 19908 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190809 #63 [ 355.077636][T19908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.087696][T19908] Call Trace: [ 355.087724][T19908] dump_stack+0x172/0x1f0 [ 355.087746][T19908] should_fail.cold+0xa/0x15 [ 355.087764][T19908] ? fault_create_debugfs_attr+0x180/0x180 [ 355.087779][T19908] ? is_bpf_text_address+0xac/0x170 [ 355.087794][T19908] ? __kasan_check_read+0x11/0x20 [ 355.087823][T19908] should_fail_alloc_page+0x50/0x60 [ 355.095423][T19908] __alloc_pages_nodemask+0x1a1/0x900 [ 355.095439][T19908] ? __bpf_address_lookup+0x310/0x310 [ 355.095452][T19908] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 355.095466][T19908] ? __alloc_pages_slowpath+0x2530/0x2530 [ 355.095485][T19908] ? kernel_text_address+0x73/0xf0 [ 355.095508][T19908] ? fault_create_debugfs_attr+0x180/0x180 [ 355.154458][T19908] cache_grow_begin+0x90/0xd20 [ 355.159232][T19908] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 355.164963][T19908] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 355.171200][T19908] __kmalloc+0x6b2/0x770 [ 355.175431][T19908] ? mark_held_locks+0xf0/0xf0 [ 355.180182][T19908] ? stack_trace_save+0xac/0xe0 [ 355.185025][T19908] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 355.190760][T19908] tomoyo_realpath_from_path+0xcd/0x7b0 [ 355.196336][T19908] ? tomoyo_path_perm+0x1cb/0x430 [ 355.201379][T19908] tomoyo_path_perm+0x230/0x430 [ 355.206208][T19908] ? tomoyo_path_perm+0x1cb/0x430 [ 355.211215][T19908] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 355.217259][T19908] ? __fget+0x35d/0x560 [ 355.221395][T19908] ? __kasan_check_read+0x11/0x20 [ 355.226404][T19908] ? __kasan_check_read+0x11/0x20 [ 355.231425][T19908] ? __fget+0xa3/0x560 [ 355.235501][T19908] ? lock_acquire+0x190/0x410 [ 355.240169][T19908] ? do_sys_ftruncate+0x282/0x550 [ 355.245190][T19908] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 355.251424][T19908] tomoyo_path_truncate+0x1d/0x30 [ 355.256496][T19908] security_path_truncate+0xf2/0x150 [ 355.261764][T19908] do_sys_ftruncate+0x3d9/0x550 [ 355.266597][T19908] __x64_sys_ftruncate+0x59/0x80 [ 355.271528][T19908] do_syscall_64+0xfa/0x760 [ 355.276039][T19908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 355.281935][T19908] RIP: 0033:0x4597f7 [ 355.285809][T19908] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 355.305397][T19908] RSP: 002b:00007f277c1ada88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 355.313794][T19908] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004597f7 [ 355.321749][T19908] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 355.329727][T19908] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 355.337690][T19908] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 355.345661][T19908] R13: 00000000004c8abb R14: 00000000004df9a0 R15: 0000000000000003 09:56:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0xf5ffffff00000000, 0x0, @mcast1}}}, 0xff6a) 09:56:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x2, @mcast1}}}, 0xff6a) 09:56:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 355.355115][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 355.360896][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 355.366733][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 355.372488][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 355.378302][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 355.384144][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:50 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:50 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='\\fs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 355.519774][T19908] XFS (loop5): Invalid superblock magic number 09:56:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x4, @mcast1}}}, 0xff6a) 09:56:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfX\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x5, @mcast1}}}, 0xff6a) 09:56:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x500, @mcast1}}}, 0xff6a) 09:56:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x7000000}}], 0x1, 0x0, 0x0) 09:56:51 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x4000, @mcast1}}}, 0xff6a) 09:56:51 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='x%s\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x40000, @mcast1}}}, 0xff6a) 09:56:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xf\\\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 356.215069][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 356.221456][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 356.387382][T19996] XFS (loop5): Invalid superblock magic number 09:56:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x1000000, @mcast1}}}, 0xff6a) 09:56:51 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='x.s\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x2000000, @mcast1}}}, 0xff6a) 09:56:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfc\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x5000000, @mcast1}}}, 0xff6a) 09:56:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x1f000000}}], 0x1, 0x0, 0x0) 09:56:52 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='%fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x40000000, @mcast1}}}, 0xff6a) 09:56:52 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='x/s\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0xf5ffffff, @mcast1}}}, 0xff6a) 09:56:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0xfffffff5, @mcast1}}}, 0xff6a) 09:56:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfd\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x4000000000000, @mcast1}}}, 0xff6a) 09:56:52 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='\\fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x100000000000000, @mcast1}}}, 0xff6a) 09:56:52 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='x\\s\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x3f000000}}], 0x1, 0x0, 0x0) 09:56:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x200000000000000, @mcast1}}}, 0xff6a) 09:56:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfi\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x500000000000000, @mcast1}}}, 0xff6a) 09:56:53 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='x%s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x4000000000000000, @mcast1}}}, 0xff6a) 09:56:53 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:53 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xf#\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0xf5ffffff00000000, @mcast1}}}, 0xff6a) 09:56:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfl\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x300}}}}, 0xff6a) 09:56:53 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='x.s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x40000000}}], 0x1, 0x0, 0x0) 09:56:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2]}}}}, 0xff6a) 09:56:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4]}}}}, 0xff6a) 09:56:54 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xf%\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='x/s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfo\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x5]}}}}, 0xff6a) 09:56:54 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xf*\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:54 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200), 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='x\\s\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x500]}}}}, 0xff6a) 09:56:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfp\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 359.485084][ C1] net_ratelimit: 3 callbacks suppressed [ 359.485092][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 359.496433][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 359.502230][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 359.508000][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 359.513780][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 359.519548][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 359.645076][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 359.645103][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 359.650855][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:56:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x8dffffff}}], 0x1, 0x0, 0x0) 09:56:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000]}}}}, 0xff6a) 09:56:55 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xf+\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:55 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xf#\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x40000]}}}}, 0xff6a) 09:56:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x1000000]}}}}, 0xff6a) 09:56:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfu\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2000000]}}}}, 0xff6a) 09:56:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200), 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:55 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xf-\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:55 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x5000000]}}}}, 0xff6a) 09:56:55 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xf%\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:56 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x40000000]}}}}, 0xff6a) 09:56:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0xeffdffff}}], 0x1, 0x0, 0x0) 09:56:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfx\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:56 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf5ffffff]}}}}, 0xff6a) 09:56:56 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xf.\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xf*\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:56 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xfffffff5]}}}}, 0xff6a) 09:56:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200), 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:56 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000000000]}}}}, 0xff6a) 09:56:56 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xf/\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xf+\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:56 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x100000000000000]}}}}, 0xff6a) [ 361.565102][ C1] protocol 88fb is buggy, dev hsr_slave_0 09:56:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0xf0ffffff}}], 0x1, 0x0, 0x0) 09:56:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x200000000000000]}}}}, 0xff6a) 09:56:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x500000000000000]}}}}, 0xff6a) 09:56:57 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xf0\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xf-\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000000000000]}}}}, 0xff6a) 09:56:57 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf5ffffff00000000]}}}}, 0xff6a) 09:56:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2]}}}}, 0xff6a) 09:56:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4]}}}}, 0xff6a) 09:56:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x04', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xf.\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:57 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfX\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0xfffffdef}}], 0x1, 0x0, 0x0) 09:56:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x5]}}}}, 0xff6a) 09:56:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x500]}}}}, 0xff6a) 09:56:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000]}}}}, 0xff6a) 09:56:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x40000]}}}}, 0xff6a) 09:56:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xf/\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:58 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xf\\\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x05', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x1000000]}}}}, 0xff6a) 09:56:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2000000]}}}}, 0xff6a) 09:56:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0xffffff8d}}], 0x1, 0x0, 0x0) 09:56:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x5000000]}}}}, 0xff6a) 09:56:59 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfc\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x06', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xf0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x40000000]}}}}, 0xff6a) 09:56:59 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{0x0}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:56:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf5ffffff]}}}}, 0xff6a) 09:56:59 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfd\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:56:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\a', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:56:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfX\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:56:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xfffffff5]}}}}, 0xff6a) 09:56:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0xfffffff0}}], 0x1, 0x0, 0x0) 09:56:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000000000000]}}}}, 0xff6a) [ 364.525076][ C1] net_ratelimit: 21 callbacks suppressed [ 364.525082][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 364.537440][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x100000000000000]}}}}, 0xff6a) 09:57:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\b', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xf\\\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:00 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfi\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x200000000000000]}}}}, 0xff6a) 09:57:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfc\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\t', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x40000000000}}], 0x1, 0x0, 0x0) 09:57:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:00 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfl\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2]}}}}, 0xff6a) 09:57:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfd\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\n', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 365.725073][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 365.731278][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 365.737133][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 365.743073][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 365.748906][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 365.754882][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 365.885060][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 365.885066][ C1] protocol 88fb is buggy, dev hsr_slave_0 09:57:01 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:01 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4]}}}}, 0xff6a) 09:57:01 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x5]}}}}, 0xff6a) 09:57:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfi\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\f', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:01 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x500]}}}}, 0xff6a) 09:57:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x10000000000000}}], 0x1, 0x0, 0x0) 09:57:01 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfo\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:01 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:01 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x40000]}}}}, 0xff6a) 09:57:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfl\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:01 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfp\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:02 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x1000000]}}}}, 0xff6a) 09:57:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\r', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:02 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfu\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfo\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x100000000000000}}], 0x1, 0x0, 0x0) 09:57:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x5000000]}}}}, 0xff6a) 09:57:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x0e', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:02 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfx\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x40000000]}}}}, 0xff6a) 09:57:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfp\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:03 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:03 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x02', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x10', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:03 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) 09:57:03 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) 09:57:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x700000000000000}}], 0x1, 0x0, 0x0) 09:57:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfu\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:03 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) 09:57:03 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) 09:57:03 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x03', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs#', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:04 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfx\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs>', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:04 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x04', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x1f00000000000000}}], 0x1, 0x0, 0x0) 09:57:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) 09:57:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsH', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:04 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x05', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:05 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)='X\x00\x00\x00', 0x4}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) 09:57:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsL', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:05 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x06', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) [ 369.885084][ C1] net_ratelimit: 12 callbacks suppressed [ 369.885091][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 369.896555][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 369.902326][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 369.908094][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 369.913856][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 369.919623][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 370.045071][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 370.045100][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 370.050910][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:57:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x3f00000000000000}}], 0x1, 0x0, 0x0) 09:57:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) 09:57:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsX', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x04', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:05 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\a', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:06 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:06 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) 09:57:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs^', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x05', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:06 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\b', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:06 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) 09:57:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) 09:57:06 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x06', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:06 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) 09:57:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsh', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:06 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) 09:57:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:07 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\t', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\a', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsl', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) [ 371.965076][ C1] protocol 88fb is buggy, dev hsr_slave_0 09:57:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x8dffffff00000000}}], 0x1, 0x0, 0x0) 09:57:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\b', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) 09:57:07 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\n', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:07 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) 09:57:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfst', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) 09:57:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\t', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:08 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\r', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsz', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0xeffdffff00000000}}], 0x1, 0x0, 0x0) 09:57:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:08 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x0e', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x84', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\n', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) 09:57:08 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) 09:57:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x9e', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\r', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:09 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x10', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0xf0ffffff00000000}}], 0x1, 0x0, 0x0) 09:57:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) 09:57:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) 09:57:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xbe', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x0e', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:09 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs#', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xc4', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) 09:57:09 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs^', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x10', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0xffffffff00000000}}], 0x1, 0x0, 0x0) 09:57:10 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) [ 374.935077][ C1] net_ratelimit: 20 callbacks suppressed [ 374.935086][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 374.940812][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:10 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:10 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) 09:57:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs(', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\"', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:10 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:10 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfsw', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:10 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) 09:57:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsH', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs#', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:11 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x7}}], 0x1, 0x0, 0x0) 09:57:11 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) 09:57:11 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x94', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:11 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) 09:57:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xd0', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfsH', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 376.125076][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 376.130930][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 376.136757][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 376.142523][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 376.148337][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 376.154082][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 376.285068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 376.285094][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:57:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, 0x0, 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:11 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) 09:57:11 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xc4', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfsL', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x1c', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) 09:57:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x10}}], 0x1, 0x0, 0x0) 09:57:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:12 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs(', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs^', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, 0x0, 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) 09:57:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsP', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:12 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xd0', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfsh', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:13 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) 09:57:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x700}}], 0x1, 0x0, 0x0) 09:57:13 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x1c', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:13 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) 09:57:13 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) 09:57:13 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xb8', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, 0x0, 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfsl', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:13 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) 09:57:13 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xd6', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:13 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) 09:57:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xd6', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x1f00}}], 0x1, 0x0, 0x0) 09:57:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) 09:57:14 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfst', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:14 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) [ 379.277898][T21847] XFS (loop1): Invalid superblock magic number 09:57:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:14 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfsz', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:14 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) 09:57:15 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfsI', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 379.672605][T21878] XFS (loop4): Invalid superblock magic number 09:57:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x3f00}}], 0x1, 0x0, 0x0) 09:57:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) 09:57:15 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x94', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) 09:57:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) 09:57:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsI', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 380.285075][ C1] net_ratelimit: 15 callbacks suppressed [ 380.285081][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 380.296592][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 380.302349][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 380.308086][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 380.313825][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 380.319557][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:15 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xbc', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:15 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xc4', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:15 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:15 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x80', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x4000}}], 0x1, 0x0, 0x0) 09:57:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:16 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xbd', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) 09:57:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs(', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) [ 381.165061][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 381.170852][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) 09:57:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x9a', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:16 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xf6', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) 09:57:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x40000}}], 0x1, 0x0, 0x0) 09:57:16 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xd0', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) 09:57:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) 09:57:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xbc', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 382.365070][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 382.370905][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:17 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:17 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xf8', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) 09:57:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x1c', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xbd', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x100000}}], 0x1, 0x0, 0x0) 09:57:17 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) 09:57:18 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xd6', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:18 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) 09:57:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xea', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 383.147770][T22167] XFS (loop1): Invalid superblock magic number 09:57:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) 09:57:18 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xf6', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 383.465510][T22167] XFS (loop1): Invalid superblock magic number 09:57:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) 09:57:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) [ 383.603946][T22207] XFS (loop5): Invalid superblock magic number 09:57:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xf8', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) 09:57:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:19 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xfe', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 384.108358][T22260] XFS (loop1): Invalid superblock magic number 09:57:19 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:19 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfsI', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:19 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x7000000}}], 0x1, 0x0, 0x0) 09:57:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) [ 384.544724][T22308] XFS (loop4): Invalid superblock magic number 09:57:19 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:19 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) 09:57:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) 09:57:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xbc', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) 09:57:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 384.918130][T22339] XFS (loop1): Invalid superblock magic number [ 385.108954][T22366] XFS (loop4): Invalid superblock magic number [ 385.325058][ C1] net_ratelimit: 8 callbacks suppressed [ 385.325067][ C1] protocol 88fb is buggy, dev hsr_slave_0 09:57:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f45424406"], 0x5) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xbd', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:20 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x1f000000}}], 0x1, 0x0, 0x0) 09:57:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) 09:57:20 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) 09:57:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xf6', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 385.709819][T22422] XFS (loop1): Invalid superblock magic number 09:57:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) 09:57:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) [ 386.105879][T22442] XFS (loop4): Invalid superblock magic number 09:57:21 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f45424406"], 0x5) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xf8', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:21 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x3f000000}}], 0x1, 0x0, 0x0) 09:57:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) 09:57:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) [ 386.506089][T22484] XFS (loop1): Invalid superblock magic number [ 386.525118][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 386.530907][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 386.536734][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 386.542497][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 386.548317][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 386.554057][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:21 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) [ 386.685061][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 386.685088][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 386.690863][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) [ 386.814167][T22520] XFS (loop4): Invalid superblock magic number 09:57:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) [ 386.938277][T22534] XFS (loop5): Invalid superblock magic number 09:57:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f45424406"], 0x5) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:22 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x40000000}}], 0x1, 0x0, 0x0) 09:57:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) [ 387.392061][T22570] XFS (loop1): Invalid superblock magic number [ 387.416172][T22572] XFS (loop4): Invalid superblock magic number 09:57:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:22 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) [ 387.631766][T22614] XFS (loop5): Invalid superblock magic number 09:57:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) 09:57:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) [ 387.884118][T22645] XFS (loop4): Invalid superblock magic number [ 387.999458][T22614] XFS (loop5): Invalid superblock magic number 09:57:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b0500"], 0x8) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:23 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) 09:57:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x8dffffff}}], 0x1, 0x0, 0x0) 09:57:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 388.300364][T22681] XFS (loop1): Invalid superblock magic number 09:57:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) 09:57:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:23 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) [ 388.622822][T22681] XFS (loop1): Invalid superblock magic number [ 388.630372][T22707] XFS (loop5): Invalid superblock magic number 09:57:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) [ 388.683873][T22719] XFS (loop4): Invalid superblock magic number 09:57:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b0500"], 0x8) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) 09:57:24 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs ', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0xeffdffff}}], 0x1, 0x0, 0x0) 09:57:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) 09:57:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 389.234318][T22772] XFS (loop5): Invalid superblock magic number 09:57:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) 09:57:24 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x02', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) 09:57:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:24 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) [ 389.611784][T22802] XFS (loop4): Invalid superblock magic number [ 389.922320][T22802] XFS (loop4): Invalid superblock magic number 09:57:25 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b0500"], 0x8) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:25 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0xf0ffffff}}], 0x1, 0x0, 0x0) 09:57:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) [ 390.129296][T22854] XFS (loop5): Invalid superblock magic number [ 390.174030][T22858] XFS (loop1): Invalid superblock magic number 09:57:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs ', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) 09:57:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) 09:57:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) 09:57:25 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 390.624574][T22858] XFS (loop1): Invalid superblock magic number [ 390.685061][ C1] net_ratelimit: 13 callbacks suppressed [ 390.685069][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 390.696528][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 390.702301][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 390.708158][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 390.713925][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 390.719710][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 390.845051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 390.845067][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 390.850824][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 390.856549][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) 09:57:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b050073"], 0x9) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0xfffffdef}}], 0x1, 0x0, 0x0) 09:57:26 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x10', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) [ 391.092209][T22940] XFS (loop4): Invalid superblock magic number 09:57:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) [ 391.140390][T22945] XFS (loop5): Invalid superblock magic number 09:57:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) 09:57:26 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) 09:57:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:26 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) [ 391.478764][T22989] XFS (loop1): Invalid superblock magic number 09:57:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:27 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b050073"], 0x9) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) [ 391.841863][T22989] XFS (loop1): Invalid superblock magic number 09:57:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0xffffff8d}}], 0x1, 0x0, 0x0) 09:57:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x10', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 391.912124][T23024] XFS (loop5): Invalid superblock magic number 09:57:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) 09:57:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) 09:57:27 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x01', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:27 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) [ 392.470428][T23080] XFS (loop4): Invalid superblock magic number 09:57:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs ', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:28 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b050073"], 0x9) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) 09:57:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0xfffffff0}}], 0x1, 0x0, 0x0) 09:57:28 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) 09:57:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) 09:57:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x01', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) [ 393.120599][T23139] XFS (loop1): Invalid superblock magic number 09:57:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:28 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) [ 393.416543][T23181] XFS (loop5): Invalid superblock magic number 09:57:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 393.775681][T23208] XFS (loop4): Invalid superblock magic number 09:57:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x40000000000}}], 0x1, 0x0, 0x0) 09:57:29 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) 09:57:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x10', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) [ 393.962042][T23231] XFS (loop1): Invalid superblock magic number 09:57:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) 09:57:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) [ 394.354880][T23277] XFS (loop5): Invalid superblock magic number 09:57:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:29 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) 09:57:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x10000000000000}}], 0x1, 0x0, 0x0) 09:57:30 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x03', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) [ 394.695562][T23277] XFS (loop5): Invalid superblock magic number 09:57:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) [ 394.819759][T23318] XFS (loop4): Invalid superblock magic number 09:57:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:30 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) [ 395.105209][T23351] XFS (loop1): Invalid superblock magic number [ 395.278710][T23367] XFS (loop5): Invalid superblock magic number 09:57:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 395.528340][T23389] XFS (loop4): Invalid superblock magic number 09:57:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x100000000000000}}], 0x1, 0x0, 0x0) 09:57:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) 09:57:30 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) [ 395.642510][T23367] XFS (loop5): Invalid superblock magic number 09:57:31 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) [ 395.725063][ C1] net_ratelimit: 18 callbacks suppressed [ 395.725072][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 395.736555][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) 09:57:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) [ 395.879312][T23427] XFS (loop1): Invalid superblock magic number 09:57:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x01', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) 09:57:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) [ 396.116641][T23448] XFS (loop4): Invalid superblock magic number 09:57:31 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 396.473066][T23448] XFS (loop4): Invalid superblock magic number 09:57:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x700000000000000}}], 0x1, 0x0, 0x0) 09:57:31 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:31 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) 09:57:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) [ 396.658325][T23497] XFS (loop1): Invalid superblock magic number [ 396.669998][T23504] XFS (loop5): Invalid superblock magic number 09:57:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x01', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) 09:57:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) [ 396.925055][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 396.930898][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 396.936712][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 396.942452][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 396.948241][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 396.953991][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 397.085055][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 397.085081][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) 09:57:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x1f00000000000000}}], 0x1, 0x0, 0x0) 09:57:32 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x03', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:32 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) [ 397.588223][T23576] XFS (loop5): Invalid superblock magic number 09:57:33 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x03', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) [ 397.681963][T23592] XFS (loop4): Invalid superblock magic number 09:57:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}}, 0xff6a) 09:57:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x3f00000000000000}}], 0x1, 0x0, 0x0) 09:57:33 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}}, 0xff6a) 09:57:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}}, 0xff6a) 09:57:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}}, 0xff6a) [ 398.583809][T23649] XFS (loop5): Invalid superblock magic number 09:57:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:57:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 398.684242][T23676] XFS (loop1): Invalid superblock magic number 09:57:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}}, 0xff6a) [ 398.864926][T23704] XFS (loop4): Invalid superblock magic number [ 398.950272][T23649] XFS (loop5): Invalid superblock magic number [ 399.026991][T23676] XFS (loop1): Invalid superblock magic number [ 399.176499][T23704] XFS (loop4): Invalid superblock magic number 09:57:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}}, 0xff6a) 09:57:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}}, 0xff6a) 09:57:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) 09:57:34 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x01', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}}, 0xff6a) 09:57:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) 09:57:34 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}}, 0xff6a) 09:57:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}}, 0xff6a) 09:57:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:35 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x02', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}}, 0xff6a) [ 399.880687][T23792] XFS (loop4): Invalid superblock magic number 09:57:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}}, 0xff6a) [ 400.154779][T23820] XFS (loop5): Invalid superblock magic number 09:57:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x8dffffff00000000}}], 0x1, 0x0, 0x0) 09:57:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}}, 0xff6a) 09:57:35 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xc0', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}}, 0xff6a) 09:57:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}}, 0xff6a) 09:57:35 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}}, 0xff6a) 09:57:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:36 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x03', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x300}}}}, 0xff6a) [ 400.818726][T23868] XFS (loop4): Invalid superblock magic number [ 400.982720][T23900] XFS (loop5): Invalid superblock magic number 09:57:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x2}}}, 0xff6a) 09:57:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0xeffdffff00000000}}], 0x1, 0x0, 0x0) 09:57:36 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x03', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x4}}}, 0xff6a) [ 401.245069][ C1] net_ratelimit: 11 callbacks suppressed [ 401.245076][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 401.245101][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 401.250797][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x5}}}, 0xff6a) 09:57:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x500}}}, 0xff6a) 09:57:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:36 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x4000}}}, 0xff6a) 09:57:36 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 401.608811][T23958] XFS (loop4): Invalid superblock magic number 09:57:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x40000}}}, 0xff6a) [ 401.819427][T23982] XFS (loop5): Invalid superblock magic number [ 401.837848][T23980] XFS (loop1): Invalid superblock magic number 09:57:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f00000003c0)) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x1000000}}}, 0xff6a) 09:57:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0xf0ffffff00000000}}], 0x1, 0x0, 0x0) 09:57:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x2000000}}}, 0xff6a) 09:57:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x5000000}}}, 0xff6a) [ 402.278561][T24028] XFS (loop5): Invalid superblock magic number [ 402.292097][T23980] XFS (loop1): Invalid superblock magic number 09:57:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x40000000}}}, 0xff6a) [ 402.385875][T24048] XFS (loop4): Invalid superblock magic number 09:57:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0xf5ffffff}}}, 0xff6a) 09:57:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0xfffffff5}}}, 0xff6a) [ 402.579354][T24028] XFS (loop5): Invalid superblock magic number 09:57:37 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x0f', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:37 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x4000000000000}}}, 0xff6a) [ 402.787635][T24048] XFS (loop4): Invalid superblock magic number 09:57:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f00000003c0)) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x100000000000000}}}, 0xff6a) 09:57:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0xffffffff00000000}}], 0x1, 0x0, 0x0) 09:57:38 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x200000000000000}}}, 0xff6a) 09:57:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x500000000000000}}}, 0xff6a) [ 403.165063][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 403.170904][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 403.176751][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 403.182528][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 403.188350][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 403.194109][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0x4000000000000000}}}, 0xff6a) [ 403.283921][T24120] XFS (loop1): Invalid superblock magic number [ 403.318434][T24133] XFS (loop4): Invalid superblock magic number [ 403.325087][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 403.331452][T24124] XFS (loop5): Invalid superblock magic number 09:57:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1, 0xf5ffffff00000000}}}, 0xff6a) 09:57:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 403.656465][T24133] XFS (loop4): Invalid superblock magic number 09:57:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f00000003c0)) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:39 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 404.176325][T24208] XFS (loop5): Invalid superblock magic number 09:57:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 404.245611][T24219] XFS (loop1): Invalid superblock magic number 09:57:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:39 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 404.608051][T24219] XFS (loop1): Invalid superblock magic number [ 404.639931][T24256] XFS (loop4): Invalid superblock magic number 09:57:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:40 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 405.100197][T24256] XFS (loop4): Invalid superblock magic number [ 405.106801][T24292] XFS (loop5): Invalid superblock magic number 09:57:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 405.278461][T24318] XFS (loop1): Invalid superblock magic number 09:57:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:40 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 405.572058][T24292] XFS (loop5): Invalid superblock magic number 09:57:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:41 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x80', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 406.272216][T24392] XFS (loop4): Invalid superblock magic number 09:57:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:41 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:41 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 406.835811][T24446] XFS (loop5): Invalid superblock magic number 09:57:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 406.948224][T24457] XFS (loop1): Invalid superblock magic number 09:57:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x01', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:42 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 407.325073][ C1] net_ratelimit: 17 callbacks suppressed [ 407.325081][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 407.336571][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 407.342371][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 407.348158][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 407.353934][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 407.359705][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 407.485170][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 407.490985][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 407.495071][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 407.502528][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:42 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 407.619932][T24517] XFS (loop1): Invalid superblock magic number 09:57:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:43 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:43 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:43 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 408.448523][T24597] XFS (loop4): Invalid superblock magic number [ 408.458132][T24605] XFS (loop1): Invalid superblock magic number 09:57:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xc0', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:57:44 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x2b1, 0x0) 09:57:44 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 409.281719][T24669] XFS (loop4): Invalid superblock magic number [ 409.298920][T24666] XFS (loop1): Invalid superblock magic number [ 409.583552][T24669] XFS (loop4): Invalid superblock magic number [ 409.628742][T24666] XFS (loop1): Invalid superblock magic number 09:57:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x3) 09:57:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x107) 09:57:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x01', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:45 executing program 2: r0 = socket(0xa, 0x1, 0x257) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0xfffffffffffffffe}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400400, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000040)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @rand_addr="184a6c0c1cee4542302cff44d27fca8d"}}, {{0xa, 0x0, 0x1ff, @loopback}}}, 0xffffffd0) pwritev(r0, &(0x7f0000000680)=[{&(0x7f0000000080)="39f5e53599c1f2976b71909859f20aafc3e6067887da9ab9e60d22a944bd370694ec8237986542bb878021e9ccaf050292b553909d7b91c09f4c3e198d4b9f9718379e64bd785fa9126d982862bb513d27d20c72d1e9c7ae9a7646c944067f80165e40d52f8814ffafbeb7d914df1ed16c02360bd429afff6d6ce4fa9db257044d77a35de85c0cf24c0c8f3ad4e5443cef0b1ed13ed3a8", 0x97}, {&(0x7f0000000280)="bc017b6a7449e622d343a20d92fae20363ec5aa85c433dd1c9162d5a2f898c7b287e7fe9065517103102d6e0947969f46cf9c28201a897e245add6cdf712eb573233f4b6e00eca1e408401a54ad0e2608c1ea8e5a523d20045d245691f9b2f43931c89a982d94fb1455f3918aa0252d2c52b15412f4fef08e30e51a4b1c96a7bf188ceaa070eb7c05cca47697f087df14d8c2e176ba2670a4b3b128fda2439d9c24088f1c19b91679488101257b24a527cae2d4bcbe224f714802f1d6c69b0", 0xbf}, {&(0x7f0000000480)="fdde3cdc12d4", 0x6}, {&(0x7f00000004c0)="29ad9ca6d7ef31f7b29ebbd040c86c5163ab343560bc14fa3cc4df24564922106579904f121bda2ab5015012ce4018f8ade3529366fa88a05791388b82a569c7d9b76888e281a5dcdeaca3bdce22d7a3d5b2e8d2e53883b0a140bbc9a79048813449fef4dfc14e39309b8dd24337d6ca554bcd56bce9cee04b22af9d1f57998ccda5bda82c6b7406eacba3399a4bf792f16b621b4e6da80ded28d54fd144175110f67e814a9a2d401b9639e3682a6aff903821885019c5522e037529220d34375d6755d5e1fd1de17abf226f4b", 0xcd}, {&(0x7f00000005c0)="a46a63955338372a6cda3bc1b2243a9f0f8378d5b4dbc2b78b6f00d731b9a98e294a671fd1eb21404de205d7092cae4121b4d7da4196e8f9078dffc2194c06a568e394a9c88134ef2eb832a7537761d1931f32b4564a89c3003e569477e7e79ea12518dc8e2ca926ca4c1a88b033fd905757f5bf2b8f5c43f295b80a97f477538f8851dece", 0x85}], 0x5, 0x0) 09:57:45 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:45 executing program 2: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000480)) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000280)={0x3ff, 0x8, 0x54e8a21e, 0x0, r1}, 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) sendto$inet(r0, &(0x7f0000000500)="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", 0x1000, 0x20000000, &(0x7f0000001500)={0x2, 0x4e21, @multicast2}, 0x10) r2 = accept4(r0, &(0x7f0000000140)=@sco, &(0x7f00000001c0)=0x80, 0x800) setsockopt$SO_TIMESTAMP(r0, 0x1, 0xdd4322709376fdc3, &(0x7f00000002c0)=0x80000000, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001540)='/dev/vcs\x00', 0xa00, 0x0) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000001580)={0x2, 0xc421}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000300)=r1, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000004c0)=[@in6={0xa, 0x4e20, 0x1, @empty, 0x10000}], 0x1c) 09:57:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:45 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x2b1, 0x0) 09:57:45 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x1, 0x2}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e21, @local}}, [0x94, 0xffffffffffffffff, 0xc06c, 0x400, 0x6, 0x3, 0x1, 0x101, 0x0, 0x1, 0xffff, 0x56, 0x7fff, 0x5, 0x8]}, &(0x7f00000002c0)=0x100) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 410.327955][T24752] XFS (loop1): Invalid superblock magic number 09:57:45 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0xae60, 0x0) r0 = socket(0x8, 0x4, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 410.514864][T24781] XFS (loop5): Invalid superblock magic number 09:57:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) sendto$packet(r0, &(0x7f0000000140)="1f7cb8ac44ae11208da08ec01e49231c2cbeacf4cc9ef96f05daa65be4fe239ad874dd12cbaf2e188ba7a397a925fc4b1ec2dd06401a5383a76046d1b47d250d2397d1525f65fc167f3cf95ee3b2c97af4e4cdeb947862d9820baaffbc", 0x5d, 0x800, &(0x7f0000000300)={0x11, 0x6, r1, 0x1, 0x6}, 0x14) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000780)={0x0, 0xec}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000840)={0x0, 0x1000, "81bb7d911294c7623c01b56da2c32778e4b5aebef8d842de3c252dadd60fb659cc055e0f13629f87790f22e6202f957961098baa2f836b7f986f9866be63ceffe3973e925a003edcea4df9fd5655f5be695b7a4eedccbff30542466845572cbffbaa346422af6ca9bb35063589a8f779373ca4fc65616dc906de405add400f74c7c031f82c207c1a11a8eaf63fc11e1c02baa0b7e587555d816d099e414a0971b484f23f79003f9bb1fd53065cfe8ec442ed02d90da2d4a7698d5f29ba8dc7087e0737f716ee999d33494095b907660c0d746d98f75bec92d735c780b95579f615e7af2680684fbcd6233304e834ebc48024010c4d953ec84465fa337ed372358581b7496cd4b20367cfa7b0756231bbf5320a3748789f54945dc0008650a48e5b6df763ecdcbc7ba831d5ac745adbf0177db13adc139b17cde63de2734ef765911a8d6a21dbc841cab52c7d0954952b36664c7d4ef7aee3c66ad668d74ba7b05d2379daf73dbaec93adb5b055dd0c72a1f49d9af11cb56b74636ae8b43be6bd07a1b7ff7b9be92a999d90e29a067bfd08dc7ab55ec9697ea5d33505666861cef84facb7e7c5f6a7e1a5ae0a5a8df5daca8223362cd35c3954b86ec2105de279f10d446f316b69488894822a4e95ba88619570cb004bb44014a022e9d5a082a5fb98b71302923fa09211e4409d3d261945d241c7f13e2eeff060c7854efd65b839b9a3e3c2abdcaffbae74932fe8590a66a3f14afe0ce4616b88ab9c4cd2418d9ce686ce7ab55389fd53390e396311089621a78efe2b8dd18c1548b638d3dee872e7d2e996f28e871e1d9725c02f719f9bd0dc6260ea8f856e41e5bb945ce717e6b4f85f111659ebe57cd7782cffc38c650be271b23a1cf711c05a8bbf0b36d8780003b1fd91a42f7b96498a184ab448c6924ce683e71a829932044e4668055f94476ed4b59da554cb9ed18b5b5b26cb2a739e9a84a7b8fcea280ef461874cf184ffe645e5997c176f5beef86a08d71ab6960aa9d19e347026c9ef5f6b5d098248938e9cec7c66c5e8ff9662abf3bd84609b509d9b57efc00d9caf268aa6aedb9e3811bbc730dadfed43672383dcc2a8a63c92b1869652453d5ad72f21f6f0d8119e9a073998aa18aaab1e64a4b3df4f010a7e7d2a67472bbec4d3f264b25a26ef454727f64ee764f4c01a30ea24985e0c73f31f7fd5bad2ed185115f93365f721521a493613edf75516f25b1ec518dd4af1eb41d7b16aee49a57d5ec8d08d1efa5d6fce4e6eb5c428e66dcfe69afb4d562a3be0c498a87216b878bcd90fb0466254fc6dc24b29e537c6af0da3dc933cc5e1c5bccc64816cbea207a9d6030b83efa34d96d83e934ca99fd863d16dfaeee52299d8629b04f17bd943a23350c5debb6d958544bbc9ce0eb7ab8965e65a125ec348ed6555fb0c991e04fcca0dc2b6d40d53376292ffd166bca60ab37f81795dc26e3e8f236a2e985c0578816556b3b6eaabc41df0dedbd9bf8526c4dc7e526d81699a52edd9beb8cd95f3052659dae8b81e810f6907d93ca30470308bcc9ff8310c3966243ed8c5bb45692e50dcd217b057b5cb5b85b68161ac80fd523dcc9a129d19551b74598001b23e2e6053b5c3d0bf66f62a3a674182b4b6c1dad8243fa1eb6ef9dc4042da719ca6a3c4826d352813d2d25220c690adde39ec4aae4b163fb65d5752d197261d81446a8af37af0be40d6d3265067e9951a33a89990718fd11500d0f536a40c042a976e084673efe8d4966907ca7f88c4645bece8998c710754186c5f3d63011206f1f16b45ef59cd98fe8a0baac6aa6ba96058f1d8ed2973a8d7de1b8fe9f974b0079200700678430754d70c3bd98a86547080587f0c4ac0937d63526005a4c91ff083cd5ec7e5fb1e5617b9b3c2bd4f2f40e7c2abb9763855b9d8fe2a1576ecc98e17de666bd80aedd36a40032c1b2cdfc846f0f9820eaa61dd4c1ea0c3105990ce77ee2b4e6a3419d6b100331f049e6556f10daf55bf424de9ce3e56f92c157518691b00c86987c9e2bde1403402f5a287ca3b238fe1284892a78d250ddfe1c2d76c5142d09e3188ed70454927ae18789f0a82673d6bdcff17883d159a0c66f4e30436b88acefea0646e86ba5e8b7ad311326a569c9d2ac9982f1179e03800803d6b9c2ffbe06e75166495457429b020a9cd85a70ad01e8a65630c786969b1147f636474c8907709801572673888d1d881748cee5529121b6aefdcfdb6b3ce2888c145373b7ae045d8382c216ebd4f5284d6dee0bd8b2ee884ac12c54de0c24cfa4ea9797fc7c970b84cd7d090d11cf67d0e9958c32d46487cf7d46f9b8821a4602d9ca4af6cb96e7fcd2af97a83967f55aaf64098d0d4cf6cc48bbeeced99926b7c4ae7980eddc35c53d618939c3185a5a336bbf9fa76c02f06fbba05f0475fd0d8a60d3a3f38de13ed2d43a66e8c61c02aaa1ddce23b4ade09e59eca286057a7ff5d372b0d2b42f642c2a5571dc01db5bedd5af82cba6c9a40afc894d0282076d5b5d88bc4b0fd9ceb4fd8098e163a6c881ae8463a97cbcd68362d6b91aaf48a34c10097c911f55d8bb47361ff84e5bc19f3d50499a677d9754b16743db369478abaffde3efda98471ba5c857b172a15715ad2a843cff9b238768f2281c34144ef1bce398a232c738f56d96fb88a23a5eb2696a2f36fa04ed3dbc0c9058223897d7e9fd106359b208833aef921dc9225b9ada9ef700037d1d12e309d43a286022309bd2694ee2ae625774e7c3c1dda792e27045ed064979c5b7deb8e7f66c09d8409a19303e7492b700a27d532d00fa5c1d1291be5a1152a328ef054ffff5ad8ae55f88811fc12fcde3d04a3688eb749b4afb2f76d5b14113499bbd16c92d986d1bea6c47ff69c297c80e4ca8a72afeab2f844b9b30c43a429105cb8eb51eea7becaea8677c3853c13b25edb840a49fe0d9bff6b73c8297d9aa14e80c7f367e9f3d17ea4023a0ae66030aaa1ee10c49bb1e0579d090796d896eb9b9486fb5595b2a056b217b8e65e477deab8d2a26d0eca97269e581489908008bf4221cc09860960ee271afdf0b6c03a14499bdd0497156cd3c9e4219f8afd86e962c84a65536bf0e923cfb6d970fef29deded96265de103c748557d72d6f9ebc52e3f88172823a7a7cb27401ce3742b0ebdaa76e4ce36ddcdcfda4c634000dfa6b0f7d6313d42668196d55320e3552b0973ea7e5505ceefeec85ce068d6879d29f13dfbf934949c47c1d431b768e74d2c5802f2387dbc8db8a03a4026a3253686d512e9438791c03384f1922031d26db7cb454d111851dca6cdc2c1a18e21b17c863cdcb1485b45c60d97b6bf6b403ff86b41e4a925c64ec9ab5f6fd44a9528c47bca0e879a508a6b1b4e06a381286ff529aac068ddaf9ae7914ae3864e9475e97c63c72ca1cfca2fefb04d711444f469bec60689237ade6488ce91d76602d7af51fc04258e52154a11c68da61145590b647af260d6ae3d992cf3c86811e68e141eb12eda1679af3d516c81f1022dd25b7db8622e034fb94a9b3bc88ff0be34f4133fcdff614cd6aed304756dec74aed9c78d89fceaebeb55f1960d25f11186c94c157181780f8c1683b787c68e4ed51a650f1874275b99fa17256bcd12e5d3dbabbfc28fbc865e21bb87846b96ad4d0cb8a5218f0559badc182507bd52c0c2c1b6cb9f26c06e4964b7c9d4be80cb2655e514f32565f70e3c3468abc7f405fb1164fe1a6b7be46c1249a1fb9950cb79f34fed79f9399395431f2892abcd928527e07a996827a79a215f54cf1f9901f2506d87acc53a3ccf36a2b8d9cb0cb6927431b22ef07df4f98367c2d8783796ad799d62c1a0d76ea9b354195c653cfde0ed9260cf88127704efb1e5d926b08ed147e7c11e3ca4aea04e9566f512720bed157c4ac2e937633ee164982b7e502bd27e90f1436515ce209f92f5a4006a725d11a212f2dd67dbd50f24a86f7d24e4af73b6e33ccf637cd7d56b002a5ec07913045aee264097ce03642158414f413ef3908622a391c599542dfc08ebc56b7653fd038fd65fd16bda50b26c46eb137ec936ac3520a5f5b05d12c19832aa451df51892e00e27b9023ed011661f14af4131541357369728089c0d4d89c79fbe86514e053931018af9c61935b249c37d3a4a506c2e8cb1b9034e68e320f55e414b7e798d4939f5217f03dccd5978450b4caefeb5165b54b7cbbea4e2d697230d605b2843ace95bf061dac5015abcde8dabf2099853c9ad37ad5e953a946c28bb25784eaaaeeebf0c6edd8ffee3d80a566675acdb83d4e56415c8c7aff670918127da247b9517d2b82b1932651f9bb645c37ec28b9473c98ba4750102ed108163b2f8ce25e4bd534812b92942edf22c8b92d591bdbc1c299051199ea0eae7320d763307d0532204de9b4827327275d8391a501b8a8d8bc14bbcc1cce7bf9237fd9947164b1eb799b581c6e0ca495fc1f91b385b27aa55358352fc56f57d3432f9821ddd13d6e6f31e862a5895d1f55e4d0c9209f427c8365b44d5df3e3d6f9b833ffc001b0c544c2003680632b7df752a68a0648d806f9fed30bc384479216c4a075d13fcd082d63924de0745de70e8ee8753aa16bda522ee86a5f9ee9306897112d3d38431bbf054d2cebee909b40529ad76e5d5577328fcdba58048d8aee4c1e8dba65e0a7451da5d992f89886ea7272fa177863c35ee4061de6d4bc285d8b326b110235b1c8540909426e7db13c01034f9df8f43216201e8604e8f38ff643778a752db7fa6548dce337d37cb68375de0f5c3f913b937d3fe3ada1dd772df4b962cf22e7d6af29d20cce674573cb61bac0dfdf988ed1a158c5732e1f4a71f3b0c20924a4eebed0486b71dae37cc7671ed12a3ffb668ab8c72b42761819661d4a1099699ca8699a23595884b842983194d75a9363cb249fc7d16299e646224931f8133459ca828a12c00ce9f648dd0ae7c5b716a3367aadfd6312b900d7d2e6e40d659e347be2f1cb59fdaab375783c4bb63400110e374f3a33ab2dedf68f550a726032f0e4d95a800b772dac01dba316fe791bdba5e2b1d98017b0621ab7c088257e5246f98264f1a27e0c708a01384a6304963ec0854339f25ceba5303cee68882a38d7d032dd0df785f32684355caac2483d5af650a6a5595e274a75dea5f3705705810e67162ec31a0fab98db8a2c959b787a146f6961221cfd385d89f68147a32e1b6db362cceb5991fd32132b1109ddd4f67777c3f1d2558079669daeda4f4e2f722bb4647d49ae799d659cf7c25bc9424248cd15663027d47ddbc261c6163c1c7edd568cbc35de072fd265b40cc7ba8de9ad12c7b9d83f54bd3978652cb596f48512686310a2ec6fd866bca3b014aca80ac7e1974f295dd181bd3dbc3c0bc7f4c565d04775ba96c69bd55925ef10cb4849ead3ac56539fcebfb2c68c18e83e4613f90984ffb9f475976099a045b2d6ea2c99287acf4141574ce921226577ab47b1edc5d27025d0fd86e592d7c5c6d58fb01a50009755fc137e14c043ea653838e4a003f6703851f6be24f841901af8bac8efe26d341597d63809141de53da7c13a32787862b3909aae646e8d462f409760218dd1f8d1d45d11f3759ab5962795df5bb044a729b5c2470cec6bbe267eef6b0598e4582afb7be0cb5a466a817eb118e1729f1234977d48394d8d32a5e5d4ab507ebf422f63ed41a1c6168605ec5f7ca88d6b333bb322d18490874656f5925b0fcb2f9e631904793e7406b4598e3950746204f0a7ae062"}, &(0x7f0000001880)=0x1008) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000480)={r2, 0x6, 0x0, 0x5, 0x4001c60cac3}, &(0x7f0000000800)=0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000500)={r3, @in6={{0xa, 0x4e21, 0x7eec, @empty, 0x9}}, [0x1, 0xffffffffffffffc0, 0xd671a14, 0x3, 0xdb9e, 0x0, 0x2, 0x0, 0x8, 0x8, 0x62, 0xffffffff, 0x2, 0x2e, 0x4]}, &(0x7f0000000600)=0x100) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty, 0x693}}}, 0xffffffffffffffe5) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000640)={0x0, {{0xa, 0x4e22, 0x119, @dev={0xfe, 0x80, [], 0x25}, 0x8}}, 0x1, 0x1, [{{0xa, 0x4e20, 0x1, @mcast1, 0x5}}]}, 0x110) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/209) 09:57:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_newrule={0x28, 0x20, 0x8, 0x70bd27, 0x25dfdbfb, {0x2, 0x0, 0x20, 0x2, 0x6, 0x0, 0x0, 0xf, 0x4}, [@FRA_SRC={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x17329f7e2d145239) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:46 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 410.892406][T24781] XFS (loop5): Invalid superblock magic number 09:57:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:46 executing program 2: r0 = socket(0x10, 0x1, 0xfffffffffffffffe) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140)=0x4291, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) bind(r0, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x2, @multicast2}}, 0x45) [ 411.129298][T24843] XFS (loop1): Invalid superblock magic number 09:57:46 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x0f', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x2b1, 0x0) 09:57:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="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", 0x1000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140)={0x1f}, 0x4) 09:57:46 executing program 2: r0 = socket(0x9, 0x80005, 0xffffffffffffffff) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x8000000080000000, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x28}}, 0x4}}, [0x9, 0x3, 0x0, 0xd07b, 0x1, 0x2, 0xfffffffffffffffa, 0x1, 0x60, 0xfffffffffffffff9, 0x6, 0x80000001, 0x80000001, 0xffffffffffffffff, 0xc0]}, &(0x7f0000000480)=0x100) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000004c0)={0x0, 0x5, 0x8, 0x9}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000580)={r1, 0xdf7d}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r2, 0x2e, "ee1818cc0e176843f2bae24919a117cf85bc72fcdcec29e0c36ce9e44d7282538c8b5cb76eaeb6f2b21b6491274d"}, &(0x7f0000000200)=0x36) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:46 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x200, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0xc50290c74f24ce9) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xc0', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:47 executing program 2: r0 = socket(0x4, 0x5, 0x10000000000253) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0xfffffffffffffffe, 0x0, @mcast1, 0xffffffffffffffff}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 09:57:47 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:47 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 411.883866][T24906] XFS (loop5): Invalid superblock magic number 09:57:47 executing program 2: r0 = socket(0x1, 0x80006, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)={0x28, r1, 0x8, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0xd0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0xffffff06) sendmsg$nl_route_sched(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=@gettclass={0x24, 0x2a, 0x10, 0x70bd27, 0x25dfdbfe, {0x0, r2, {0xfff2}, {0xc, 0xf}, {0xfff1, 0x3}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x44001) 09:57:47 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/fscreate\x00', 0x2, 0x0) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000180)=""/193, 0xc1}, {&(0x7f0000000280)=""/90, 0x5a}, {&(0x7f0000000300)=""/30, 0x1e}], 0x3) r1 = socket(0xa, 0x1, 0x0) alarm(0xfff) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x6, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r2 = openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x210000, 0x100) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000500)={0x8, 0xfffffffffffffffa, 0x401, 'queue0\x00', 0x5}) [ 412.014305][T24918] XFS (loop1): Invalid superblock magic number 09:57:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x2b1, 0x0) 09:57:47 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0xebd, 0x2000) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000001c0)) write$cgroup_int(r1, &(0x7f0000000180)=0xdaa, 0x12) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}) 09:57:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 412.365078][ C1] net_ratelimit: 19 callbacks suppressed [ 412.365092][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 412.376549][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:47 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:47 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={r1, 0x6, 0x20, 0xe30, 0x40}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x03', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:47 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:47 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = add_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r1, &(0x7f0000000240)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'y\x00', 0x20, 0x100000000}, 0x29, 0xfffffffffffffffe) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) 09:57:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e20, 0x8, @mcast2, 0x81}, {0xa, 0x4e21, 0x8a, @mcast2, 0x8acb}, 0x10000, [0x0, 0xe5, 0x4, 0x4, 0x0, 0x0, 0x7fff, 0x10001]}, 0x5c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_destroy(r1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 412.704389][T24987] XFS (loop5): Invalid superblock magic number 09:57:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 412.876256][T25015] XFS (loop1): Invalid superblock magic number [ 412.894754][T25023] XFS (loop4): Invalid superblock magic number 09:57:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x2b1, 0x0) 09:57:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000180)={0x81, "0f14f2b58e2b611564c265b7b5600f27d64c391411aded6788db5ea3f633b7dc", 0x3, 0x100, 0x1ff, 0x8, 0x4, 0x4, 0xa99, 0x6a61}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 413.081160][T24987] XFS (loop5): Invalid superblock magic number 09:57:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x9, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) sync() 09:57:48 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:48 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:48 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000140)='}eth0\x00', 0xffffffffffffffff}, 0x30) migrate_pages(r0, 0xffffffffffffffff, &(0x7f00000001c0)=0xff, &(0x7f0000000200)=0x3) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000240)=@srh={0x0, 0x4, 0x4, 0x2, 0x9d6, 0x18, 0x5, [@ipv4={[], [], @local}, @dev={0xfe, 0x80, [], 0x2a}]}, 0x28) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f0000000480)={0x7f, {{0xa, 0x4e21, 0xffffffffffff7fff, @rand_addr="093a6e5691d38fc398f358901ecbb3b7", 0xdf}}, {{0xa, 0x4e22, 0xfffffffffffffff9, @mcast1, 0x96f}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:48 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x7fffffff, 0x4000) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000180)={0x8000, "9a9b943e649f8167e0edf3009f1003db91cd1c744128469425c7e28acc65d773", 0x1, 0x1}) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x0f', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 413.565067][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 413.570864][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 413.576695][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 413.582455][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 413.588275][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 413.594057][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:57:48 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0xffffffffffffffff, 0x0, @mcast1}}}, 0x108) 09:57:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@local, 0x0, 0x585cc8e660aca96d, 0x2, 0x1, 0xa16, 0x8c9f}, 0x20) [ 413.721763][T25090] XFS (loop1): Invalid superblock magic number [ 413.725078][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 413.728048][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 413.787425][T25095] XFS (loop5): Invalid superblock magic number 09:57:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x2b1, 0x0) 09:57:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000140)={@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000180)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000700)=[{&(0x7f00000001c0)="f18cf1f2a43daf782fe7d4d4af49cc0e09fd8dfa0a0405c616a00a87be936ebcbd0b5c5f60313ecd5a2586c2533c4947849ecb147a545d71dbf129b8e78cadfeaec01df1b7b3a6b00a5d3bbaacdccc83365ec3cc554c493e143af971be534174a536070de1aa4082266aee2fd03a34bd0b0355a9187d71b62e7b3b353970328900b994cfe7b6cf19d997ff18400b70e8ff392a58b500e9d50e4fe059095041d673677a", 0xa3}, {&(0x7f0000000280)="ad54144716199b1d1df555a3ae2d8713c33899efafad584f51f155bdd2f1b98ea95fb636860ce6bcbb46e9314e13f50d177694afed98bfdba1242e914ae0f41d63613e8bf687c5fbae74ea37080c0b83ae7fd0951b36a5e9b978894ff02ae937a032594ac0c68564c2db75a1079562d63f80a88f0031833f5c8dbac6180f9958375d5820db79dd5066fe8055feb5f07efdf185830109dcf734ed769f07b4cbbea72a1211ce", 0xa5}, {&(0x7f0000000480)="9107c88cfa7eee16834e6dfa386993117961a68c9df9dd0fc16c705f7e654669bfa8e710577c04e3f2ac6e01024a9a3ab6070def8f40894a7f5c45aed8a77b1ea548ee8f17d1d3bc7bba4346313401a50138abe4213acebe4a5e5f01ea7bee47b5e058db4768ff9b44bd58f0d9e3360f5e453be9c9751012e0290f0dc3682a8140e4afd96c75af257bdad6f418ee859b0418479f88d01f40dec777bb23a43a5c588e749c90a00659323fbd18102ade2fc4eb7540c35327e2a4edc20cb88e887dfbcc80dfc29dfb617b86d8b3b6", 0xcd}, {&(0x7f0000000580)="9af276e6369a56249870f258c90189b0a1fc5076b743a030f4eb9d7bab1fcb6e520b", 0x22}, {&(0x7f00000005c0)="53d32e52d81957d2501969ddb0c776bf903dfd5d6c474c47c7d587718394b97f9fbb9e8eb33541cee8b25f20835f3386a8fde2d5d80d7be63df8b5267db34470b7ae42b14cd1f4c35687e3823aa5d8040a94e6bb5b4e6f67bf34291c54090b80ce847a6c85187e01dd11cd2838976eb1768718fc5f995872a8ce2fbc5a175fe929133f1e6b28461fa91e6acd6a499092e1f382c80fa44a43fcd85d0a409e43a8532c7e3f5472d60c58f9f684045271f83dd00816ed1657152cf57b33ccf5efa72b45b3ad4786d332ab48fc24198e236e4b66ea1b3edc71ba11deda6e518a53d17b2ca4c132bd5fbf9c28d6688423c4fa2ba8", 0xf2}, {&(0x7f00000006c0)="1fdff189dd2ad5d08e9b57ac60049233769303701b79e33d42010efed781ae226e348e783ad3e266ffb7a0a8c8", 0x2d}], 0x6, &(0x7f0000000780)=ANY=[@ANYBLOB="14000000000000000000000001000000000000000000000011000d00000000000000000001000000ff0000000000000014005d4581000000000000000700"/72], 0x48}}], 0x1, 0x20000000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 414.080807][T25140] XFS (loop4): Invalid superblock magic number 09:57:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:49 executing program 2: r0 = socket(0x1, 0x3, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000280)={r1, 0x100000001, 0x8}, 0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f00000001c0)={0x8, 0x0, 0x3f, 0x0, 0xfe48, 0x59d, 0x9}) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) prctl$PR_SET_ENDIAN(0x14, 0x2) 09:57:49 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x80', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000140)=0x1, 0x4) [ 414.490209][T25170] XFS (loop1): Invalid superblock magic number 09:57:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) io_setup(0x7f, &(0x7f0000000140)=0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200, 0x0) io_cancel(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0xe165, r0, &(0x7f0000000180)="e535b8496c1f3b5e0593434f4c86bde2a0df65587d065435e17b6e702f27c317f5369f6246c2549b0a4364", 0x2b, 0x6, 0x0, 0x0, r2}, &(0x7f0000000240)) 09:57:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:50 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:50 executing program 2: r0 = socket(0xa, 0x1, 0x9ea0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1, 0x100}}, {{0xa, 0x0, 0xfffffffffffffffe, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa9}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x100000001000000, {{0xa, 0xffffffffffffffff, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xe}}}}, 0x108) [ 414.751665][T25207] XFS (loop4): Invalid superblock magic number 09:57:50 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x0, 0x0) 09:57:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x400000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:50 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 414.938402][T25215] XFS (loop5): Invalid superblock magic number [ 415.128478][T25207] XFS (loop4): Invalid superblock magic number [ 415.156001][T25245] XFS (loop1): Invalid superblock magic number 09:57:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:50 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0xa1, "34300474eb91666be7e5f6994c5709d6d388118af096398c002556b8758e9db2429d5f5d61d349f5fedffbf06e322d473cbc3241211de9652282734b69ff6f78a61802ae39144a8111b3daca237f3205dec5f9f47ceb51ba20fcb94be2e938a1f1648729b6173d8040cc7621672a099b03574bae9ec886df13a23c8af081951427d7999ad8a9ad1ce8e3289770ad14243a151dacadb6c3dc4e3cabf2821c1b5dea"}, &(0x7f0000000240)=0xa9) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000280)={r1, 0x2}, 0x37b) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000340)={0x2, {{0xa, 0x0, 0x0, @mcast1, 0x20000000}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 415.244167][T25215] XFS (loop5): Invalid superblock magic number 09:57:50 executing program 2: r0 = socket(0xa, 0x1, 0x9f3) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f0000000200)={0x2, 'syz1\x00'}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x1000000000000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x2, 0x44c1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000280)={0x0, 0x0, 0x9}) sendto$unix(r0, &(0x7f0000000140)="b2b48ec068a2bf56aea1e9306fa60af5f8fa0628707b646439198b19bc", 0x1d, 0x49f76e6f970d733e, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) membarrier(0x427743c3be5e15f1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:50 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket(0xa, 0x1, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x200000, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000340)={0x0, {{0xa, 0x2000000000000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000480)={0x100000000, {{0xa, 0x4e20, 0x9, @remote, 0x150e}}, 0x1, 0x3, [{{0xa, 0x4e20, 0x67, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, {{0xa, 0x4e22, 0x3aa6, @mcast1, 0x7}}, {{0xa, 0x4e21, 0x8, @mcast2, 0x4f3f}}]}, 0x210) [ 415.477914][T25245] XFS (loop1): Invalid superblock magic number 09:57:50 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x1, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x4e20, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 415.591812][T25296] XFS (loop4): Invalid superblock magic number 09:57:50 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='posix_acl_access\x00', 0xfffffffffffffffe) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$TCGETS2(r3, 0x802c542a, &(0x7f0000000480)) keyctl$search(0xa, r1, &(0x7f0000000300)='ceph\x00', &(0x7f0000000200)={'syz', 0x3}, r2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 415.711208][T25315] XFS (loop5): Invalid superblock magic number 09:57:51 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x0, 0x0) 09:57:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000006c0)={0x0, 0xffffffffffff88b9}, &(0x7f0000000700)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000740)={r1, @in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x26}, 0xcf}}, 0x100, 0xf08, 0x8, 0x7, 0x20}, 0x98) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x331000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f00000001c0)={r3, 0x2}) fsetxattr(r0, &(0x7f0000000200)=ANY=[@ANYBLOB='security./Sev/dsp\x00'], &(0x7f0000000240)='/dev/dsp\x00', 0x9, 0x1) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0x1, @mcast1, 0xc63b}}, 0x6, 0x9}, &(0x7f0000000480)=0x90) recvfrom$netrom(r0, &(0x7f0000000540)=""/220, 0xdc, 0x0, &(0x7f0000000640)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ashmem\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000004c0)={0x7, 0x6, 0x820e, 0x1ff, 0x7f, 0x6, 0x1, 0x3, r4}, 0x20) 09:57:51 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 415.913704][T25338] XFS (loop1): Invalid superblock magic number [ 415.971261][T25296] XFS (loop4): Invalid superblock magic number 09:57:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000280)="b403fc78da191e8c12129464a648dca8e264aa6bfa31075cf823db2b77165ff0f356fefc386f58b7a892931633a09299cfb76a1a9adf5782ef59e32aa1b74874", 0x40) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0x0, {{0xa, 0x4e24, 0x0, @mcast1}}, {{0xa, 0xfffffffffffffffd, 0x0, @mcast1, 0x1}}}, 0x108) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000180)=""/204) [ 416.096712][T25315] XFS (loop5): Invalid superblock magic number 09:57:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000540)=""/4, &(0x7f0000000580)=0x4) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x7}, &(0x7f0000000280)=0x8) syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x682, 0x400) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000480)={r2, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x8, 0x6, 0xa2dd, 0x1, 0x7}, &(0x7f00000002c0)=0x98) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x140, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000180)={0x0, 0x0, [], @bt={0x9, 0x3, 0x3, 0x5, 0x7, 0x9, 0x18, 0x4}}) openat$mixer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/mixer\x00', 0x208480, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) [ 416.224204][T25380] QAT: Invalid ioctl 09:57:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x80', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:51 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000140)={0x3d}) bind$x25(r0, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) [ 416.244663][T25380] QAT: Invalid ioctl 09:57:51 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:51 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) accept$ax25(r0, &(0x7f0000000140)={{0x3, @rose}, [@null, @bcast, @rose, @null, @null, @rose, @default, @null]}, &(0x7f00000001c0)=0x48) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) gettid() 09:57:51 executing program 2: r0 = socket(0x4, 0x0, 0xfffffffffffffffd) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xe}}}}, 0x108) msgget$private(0x0, 0x286) [ 416.498610][T25386] XFS (loop1): Invalid superblock magic number [ 416.641100][T25408] XFS (loop5): Invalid superblock magic number 09:57:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x0, 0x0) 09:57:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x4000000000000000) 09:57:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 416.838445][T25386] XFS (loop1): Invalid superblock magic number [ 416.881183][T25434] XFS (loop4): Invalid superblock magic number [ 416.927870][T25408] XFS (loop5): Invalid superblock magic number 09:57:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:52 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x40, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x6, @empty}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'veth0_to_bridge\x00', 0x0}) bind$bt_hci(r1, &(0x7f0000000240)={0x1f, r2}, 0xc) getsockopt$inet6_int(r1, 0x29, 0x13, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 09:57:52 executing program 2: r0 = socket(0xa, 0x4, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000480)={0x0, {{0xa, 0x4e21, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x0, {{0xa, 0x1, 0x7, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="39503e9bd6e0b1446bcc3231eb5868b9"}}}, 0x108) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0xffffffffffffff49, 0x4) 09:57:52 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:52 executing program 2: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x800) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'hwsim0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x1c, 0x80000) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f00000002c0)=0x2e9a, 0x4) r2 = socket(0x5, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e24, 0x9, @mcast1, 0x2}, 0x1c) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x6, @mcast1, 0xffffffffffffffff}}}, 0xfffffd3a) 09:57:52 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x10282, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000180)={0x1, 0x0, 0x102, 0x2, {0xa9, 0x8, 0x9, 0x9f}}) setsockopt$rose(r0, 0x104, 0x3, &(0x7f00000001c0)=0x9, 0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 417.308222][T25485] XFS (loop1): Invalid superblock magic number [ 417.370198][T25505] XFS (loop5): Invalid superblock magic number 09:57:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x02', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000340)={0x6, {{0xa, 0x4e20, 0x8, @mcast1, 0x10000000000}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@ipv4={[], [], @multicast1}, 0x0, 0x2, 0x2, 0xb, 0x0, 0x3ff}, &(0x7f0000000180)=0x20) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000200)) 09:57:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:52 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6bd7d95b4de69bdb, &(0x7f0000000340)={0x0, {{0xa, 0x4000000000000000, 0x0, @mcast1, 0xfffffffffffffffe}}, {{0xa, 0x0, 0x1, @empty, 0x6}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000140)={0x4, &(0x7f0000000480)=[{}, {}, {}, {}]}) bind$nfc_llcp(r0, &(0x7f0000000180)={0x27, 0x0, 0x2, 0x6, 0x6, 0x2, "77f92f4567ccf427738bfd2d98d79eea4b067fcb9b446c939f1501eb49c8194e1950b5b7c74d1cda78e501eb9fdd9093ff07ed21668755959d8f8cad1979fb", 0x1a}, 0x60) 09:57:52 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000240)={'ip6gre0\x00', 0x8}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, 0x0, 0x0) symlink(0x0, &(0x7f0000000180)='./file0\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = getuid() lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0\x00', 0x100000000, 0x6, &(0x7f0000000680)=[{&(0x7f0000000300)="34c00ce4da6e83f590139ff2fd1f8c4bc6c246d58241310671e7ab0ef075a78c89ad9d92f30a433f4e7fab3374c37e7fe158c5fc15ef3f182ec742acf82656e7935a631b13151bb094c9ba981b336c1b471d7ee7fe81e9cca2", 0x59, 0x5}, {&(0x7f0000000380)='K', 0x1, 0x4bb}, {&(0x7f00000003c0)="545b023718838894298c070f47ff1fa72b9df69266a3977b16b38307d01333495132ef2440932328a1978d453fda66a869bbe97b8cae094501987f9bec636bccb4655b1aa903fbb531b4eda8a049399e9ed85223770af9347ad9cb13ad1b22aa78d5cc456f2c9faee4a61f43535ad3de70dd3a1204291ccfadc81b2b21143b1fe1d2ce3a35094da2c7bee1f2457581bd5a8c500d485127b509ae0deaa2487e5c994a6cfbed843c9506a1eeeff34ee15779c586a97cc0420a7d8375a01be49ff6996ac02ca2ec24130de441049a6865efd0510c20cb8bf9d8e092837d967a91f77ccba5af", 0xe4, 0x9}, {0x0, 0x0, 0x9eb}, {&(0x7f0000000580), 0x0, 0x401}, {&(0x7f0000000600)="561bf03e9d57473b983580879b8a6464710666bc7f16ac6676663252c0e0cca725adac514b3109ebd2d95166a08e814135d7", 0x32, 0x1}], 0x8, &(0x7f0000000800)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',lazytime,bsddf,rootcontext=user_u,', @ANYRESDEC=r2, @ANYBLOB="2c736d61636bf8ff72ee00743d7379736673002c00"]) unlink(&(0x7f0000000640)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg(0xffffffffffffffff, 0x0, 0x0) syslog(0x9, &(0x7f00000008c0)=""/184, 0xb8) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a80)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x30, r3, 0x200, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x9, 0x3e00, 0xffffffffffff0000, 0x81}}}, ["", "", "", ""]}, 0x30}}, 0x8000) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r4 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000580)={0x9, 0xb46a, 0x9, 0x7, 0x42b, 0x3f, 0xc2ee, 0x0, 0x9, 0x100000000, 0x40, 0x5, 0x0, 0xa500, &(0x7f00000004c0)=""/163, 0x6, 0x0, 0x80}) getdents64(r4, &(0x7f00000001c0)=""/102, 0x66) bind(r0, &(0x7f0000000980)=@un=@abs={0x1, 0x0, 0x4e23}, 0x80) 09:57:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:53 executing program 2: r0 = socket(0x3, 0x2, 0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:53 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 417.860833][T25538] XFS (loop4): Invalid superblock magic number 09:57:53 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000180)={0x307, 0x4, 0x400000000000000, {}, 0x400, 0x7}) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:53 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:53 executing program 2: r0 = socket(0xa, 0x1, 0xfffffffffffffd) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 418.039993][T25540] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 418.072013][T25562] XFS (loop1): Invalid superblock magic number [ 418.110470][T25579] XFS (loop5): Invalid superblock magic number 09:57:53 executing program 0: 09:57:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0xfffffe2a) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000140)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0xe30031eb3082838a, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='auxv\x00') preadv(r1, &(0x7f0000001980), 0x1ee, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x01', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:53 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x40, 0xe100) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000180)=0x1000000000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x18}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 09:57:53 executing program 0: [ 418.502927][T25579] XFS (loop5): Invalid superblock magic number 09:57:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:54 executing program 0: 09:57:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x2, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x4e22, 0x0, @empty}}}, 0x108) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000300)={0x0, 0x9, 0x81, 0x3f, 0x5729000000000000, 0x5}, 0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140), &(0x7f0000000180)=0x4) 09:57:54 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0xfffffffffffffffd, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101800, 0x0) linkat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x1000) [ 419.112117][T25642] XFS (loop1): Invalid superblock magic number [ 419.121262][T25644] XFS (loop4): Invalid superblock magic number [ 419.133221][T25648] XFS (loop5): Invalid superblock magic number 09:57:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc4, 0x0, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40800}, 0x20000000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:54 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty, 0x4}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:54 executing program 2: socket(0x11, 0x1, 0xeb8) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x30000, 0x0) ioctl$KDENABIO(r1, 0x4b36) write$P9_RFSYNC(r1, &(0x7f0000000180)={0x7, 0x33, 0x1}, 0x7) 09:57:54 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 419.768315][T25698] XFS (loop1): Invalid superblock magic number 09:57:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 419.877495][T25709] XFS (loop4): Invalid superblock magic number [ 419.906392][ T21] device bridge_slave_1 left promiscuous mode [ 419.912605][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.946506][ T21] device bridge_slave_0 left promiscuous mode [ 419.952784][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.125773][T25698] XFS (loop1): Invalid superblock magic number [ 420.925627][ T21] device hsr_slave_0 left promiscuous mode [ 420.965172][ T21] device hsr_slave_1 left promiscuous mode [ 421.011136][ T21] team0 (unregistering): Port device team_slave_1 removed [ 421.020580][ T21] team0 (unregistering): Port device team_slave_0 removed [ 421.029809][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 421.058753][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 421.125665][ T21] bond0 (unregistering): Released all slaves [ 421.230378][T25743] IPVS: ftp: loaded support on port[0] = 21 [ 421.289614][T25743] chnl_net:caif_netlink_parms(): no params data found [ 421.313995][T25743] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.321180][T25743] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.328860][T25743] device bridge_slave_0 entered promiscuous mode [ 421.336967][T25743] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.344063][T25743] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.351648][T25743] device bridge_slave_1 entered promiscuous mode [ 421.421900][T25743] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 421.433712][T25743] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 421.460858][T25743] team0: Port device team_slave_0 added [ 421.469800][T25743] team0: Port device team_slave_1 added [ 421.539087][T25743] device hsr_slave_0 entered promiscuous mode [ 421.586785][T25743] device hsr_slave_1 entered promiscuous mode [ 421.673845][T25743] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.680967][T25743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.688325][T25743] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.695410][T25743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.733598][T25743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.747277][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 421.756344][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.763885][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 421.776677][T25743] 8021q: adding VLAN 0 to HW filter on device team0 [ 421.787185][T10242] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 421.796496][T10242] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.803636][T10242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.815427][T10236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 421.823753][T10236] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.830838][T10236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.843026][T10242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 421.851411][T10242] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 421.866856][T25743] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 421.877616][T25743] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 421.890597][T10242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 421.899026][T10242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 421.907260][T10242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 421.915794][T10242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 421.946610][T25743] 8021q: adding VLAN 0 to HW filter on device batadv0 09:57:57 executing program 0: 09:57:57 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:57 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x41) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast1, @empty}, &(0x7f00000001c0)=0xc) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x10000, {{0xa, 0x4e21, 0x0, @mcast1}}, {{0xa, 0x0, 0x2, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 09:57:57 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:57 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:57 executing program 2: r0 = socket(0x9, 0x7, 0xf9) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:57 executing program 0: [ 422.238657][T25754] XFS (loop5): Invalid superblock magic number [ 422.247101][T25761] XFS (loop4): Invalid superblock magic number 09:57:57 executing program 2: r0 = socket(0x11, 0x1, 0x8001) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'sit0\x00', 0x4000}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:57 executing program 0: [ 422.290326][T25760] XFS (loop1): Invalid superblock magic number 09:57:57 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x1, @mcast1, 0x8}}}, 0x108) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@empty}, &(0x7f0000000180)=0x14) 09:57:57 executing program 0: 09:57:57 executing program 2: r0 = socket(0xb, 0x1, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x1, 0x8000) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:58 executing program 0: 09:57:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={&(0x7f0000000140)=""/247, 0x20000, 0x1000, 0x3}, 0x18) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:57:58 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:58 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:58 executing program 0: 09:57:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x1, 0x4000) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000180)={0x67c, 0x15, 0x8, 0x4, "8533f01344fc68f17eca0e980c41e52f4c876b363a70f76914d2238f5081e0f3"}) 09:57:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x8, 0x101000) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000180)) 09:57:58 executing program 0: [ 423.112939][T25833] XFS (loop5): Invalid superblock magic number 09:57:58 executing program 2: r0 = socket(0xa, 0x1, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 423.160558][T25836] XFS (loop4): Invalid superblock magic number [ 423.186048][T25854] XFS (loop1): Invalid superblock magic number 09:57:58 executing program 0: 09:57:58 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:58 executing program 0: 09:57:58 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) [ 423.598103][T25854] XFS (loop1): Invalid superblock magic number [ 423.714153][T25908] XFS (loop5): Invalid superblock magic number 09:57:59 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfsX', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:57:59 executing program 0: 09:57:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 09:57:59 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:57:59 executing program 0: 09:57:59 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000140)=0x9, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000240)={@loopback, r1}, 0x14) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000128bd7000fcdbdf25020000003000030008000800090000001400020076657468305f746f5f626f6e640000000800010001000000080007004e20000008000400ffffff7f080005000200000008000600020000001400020008000400ff070000080007000500000008000400ff0700004874a9c2b979c4af47a370e3c42ffe9730af73896d4e3b1c82d93144bbda75c122b35e157dd54b982a6f65589e02d4f294f45e1e37e63848497729cdb6725ac01bd1095c"], 0x78}, 0x1, 0x0, 0x0, 0x14}, 0x80) 09:57:59 executing program 0: [ 424.138454][T25908] XFS (loop5): Invalid superblock magic number [ 424.145220][T25926] XFS (loop4): Invalid superblock magic number 09:57:59 executing program 0: 09:57:59 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:57:59 executing program 2: r0 = socket(0x19, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x8001, 0x0) ioctl$VFIO_SET_IOMMU(r2, 0x3b66, 0x5) socket(0x4, 0xa, 0x8) 09:57:59 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:57:59 executing program 0: [ 424.674254][T25973] XFS (loop1): Invalid superblock magic number [ 424.738737][T25994] XFS (loop5): Invalid superblock magic number 09:58:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:00 executing program 0: 09:58:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0xc75, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x1, 0x0, @ipv4={[], [], @empty}}}}, 0x108) fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "26a387bd093affca2a0ed604419b5b9a"}, 0x11, 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:58:00 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:00 executing program 0: 09:58:00 executing program 2: r0 = socket(0xa, 0x80000, 0x0) accept4$packet(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x14, 0x800) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="68000f7b6c83c5705d9e63e4750a54f028a337", @ANYRES16=r1, @ANYBLOB="080025bd7000ffdbdf25010000000000000008410000004c0018fffffffc75647000"/98], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x1) [ 424.930686][T26010] XFS (loop4): Invalid superblock magic number 09:58:00 executing program 0: 09:58:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@local, @loopback, @loopback, 0x25e8, 0x99c8, 0xb4d5, 0x500, 0x4, 0x2, r1}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 425.044354][T25973] XFS (loop1): Invalid superblock magic number 09:58:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:00 executing program 0: [ 425.243283][T26010] XFS (loop4): Invalid superblock magic number 09:58:00 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfsB', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:00 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = msgget$private(0x0, 0x408) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000001600)={0x1000}, 0x1) r2 = syz_open_dev$admmidi(&(0x7f0000001580)='/dev/admmidi#\x00', 0xfffffffffffffff9, 0x2) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000001500)='userKem1nodevcpusetmime_type{&\x00', &(0x7f0000001540)='./file0\x00', r2) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000300)=0x0) rt_sigqueueinfo(r3, 0x41, &(0x7f0000001480)={0x20, 0x13ce, 0x9}) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000140)=""/222) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000240)=""/44, 0x2c}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x2, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000002c0)) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000015c0)=""/60) [ 425.519038][T26075] XFS (loop5): Invalid superblock magic number 09:58:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:01 executing program 0: 09:58:01 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000480)={"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"}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x800, @loopback, 0x1ff}}}, &(0x7f0000000240)=0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={r2, 0xc783, 0x1}, &(0x7f00000002c0)=0x10) 09:58:01 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:01 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:01 executing program 0: 09:58:01 executing program 2: r0 = socket(0xa, 0x1, 0x0) fcntl$getown(r0, 0x9) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000280)={0x0, @aes256}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x6373) fanotify_init(0x4, 0x101800) [ 425.841387][T26098] XFS (loop4): Invalid superblock magic number 09:58:01 executing program 0: [ 426.053072][T26119] XFS (loop1): Invalid superblock magic number 09:58:01 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:01 executing program 0: 09:58:01 executing program 2: socket$inet_smc(0x2b, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:58:01 executing program 0: [ 426.265657][T26098] XFS (loop4): Invalid superblock magic number [ 426.444232][T26156] XFS (loop5): Invalid superblock magic number 09:58:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:01 executing program 2: r0 = socket(0xa, 0x1, 0x0) getgid() setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:58:01 executing program 0: 09:58:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:02 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:02 executing program 0: 09:58:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x80, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r2 = open(&(0x7f0000000140)='./file0\x00', 0x200, 0x100) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f00000001c0)={&(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4}) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000240)=""/50, &(0x7f0000000280)=0x32) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) fcntl$addseals(r0, 0x409, 0x4) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="00fb69cd065f9e617a82310d00bb48cc62f7d023b30269a25c0000b8ccf9dd825a8546c68baaf0ba20a2c3d1ec97cc1ac40d2e2a9b0f0f88f05dc5b3064ce41b7be7f5187374a30aecc7527b4c381be197ab1f6361a44312a64e56a4dd25c45edcccb6c1f98839655d8e5d5ba68ef6aa438adcaa2d7e351fe03d9315ebb7a0cd65d4b321c36bd5e616dd702753049b37ce240fd36acc275fb2cab452c890da807e8c7686d97db8b72b352947417c66e226c43b425259"], 0x69, 0x1) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000002c0)=0x801, 0x4) 09:58:02 executing program 0: [ 426.961330][T26194] XFS (loop1): Invalid superblock magic number [ 426.998383][T26200] XFS (loop4): Invalid superblock magic number 09:58:02 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20080200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @empty, 0x800}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:58:02 executing program 0: 09:58:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0x1a4, r1, 0x200, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2d}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x81}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x41b0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x66e6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf2c9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaf}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x4a14adbf6f68c4d4}, 0x40000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x1, {{0xa, 0xffffffffffffffff, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {{0xa, 0x0, 0x4000000000000000, @empty}}}, 0xfffffffffffffedb) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 427.221460][T26226] XFS (loop5): Invalid superblock magic number 09:58:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:02 executing program 0: 09:58:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = getpgrp(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/pid_for_children\x00') setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) socket$alg(0x26, 0x5, 0x0) 09:58:02 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:02 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:02 executing program 0: 09:58:02 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x4e24, 0x0, @mcast1, 0xfffffffffffffffc}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) mknod(&(0x7f0000000140)='./file0\x00', 0x4, 0x3f) 09:58:03 executing program 0: 09:58:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:03 executing program 2: r0 = socket(0xa, 0x1, 0x4000) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:58:03 executing program 0: 09:58:03 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x745400, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000180)={0x6, 0x18, [0x2, 0x4, 0x8e, 0x3, 0xfff, 0x4]}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 427.830868][T26271] XFS (loop1): Invalid superblock magic number [ 427.838842][T26279] XFS (loop4): Invalid superblock magic number [ 427.977995][T26300] XFS (loop5): Invalid superblock magic number [ 428.227815][T26271] XFS (loop1): Invalid superblock magic number 09:58:03 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket(0xa, 0x1, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) clock_nanosleep(0x6, 0x1, &(0x7f0000000500)={0x77359400}, &(0x7f0000000540)) write$char_usb(r2, &(0x7f0000000180)="f151ab3dd78c69244bd9621f3e0bc2dc6dddae127c64ba0092d3b4837d13004d58e654dd0c4f23d1b12f359692f3f53f276e5ea8fffe5cf5874cd17c9a8266888ac9a83ed864be397d6b4b95903c33a5c8b6ac6dc8b3d7b203210de5bd5d0323b1ea0d3d3cef8d055402763710ac9b66e0307b2c06785d86b45dfe11d27b583da8757fb872ff34db26133816a8cb6082cc9043890eae5f3dcf50a02333d18a69395eb6", 0xa3) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000300)={0x80000000, 0x5}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000280)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000480)) 09:58:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:03 executing program 0: 09:58:03 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:03 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xff', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:03 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:03 executing program 0: 09:58:03 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x210102, 0x41) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'syzkaller1\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000005c0)={@mcast2, r1}, 0x14) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x2, 0x9, 0x7f, 0x5, 0x8}, &(0x7f0000000280)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000002c0)={r4, 0x94, &(0x7f0000000480)=[@in6={0xa, 0x4e22, 0xffff, @mcast2, 0x4}, @in6={0xa, 0x4e22, 0x98b, @remote, 0x2}, @in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e22, @loopback}, @in6={0xa, 0x4e21, 0x8001, @mcast2, 0x7fffffff}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f0000000300)=0x10) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f00000001c0)={'icmp6\x00'}, &(0x7f0000000200)=0x1e) [ 428.513920][T26336] XFS (loop4): Invalid superblock magic number 09:58:03 executing program 0: 09:58:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000140)="42a630c9acc607726e250c090260ec6fb826193878c058d946ad3e94df16475c28cbd420d11304d0f44a5d66eb7166d91fc3d3a153b4c430563eb8c50a2a44e3e0c4ed0a6902e32d5e862806cf5fe68dd1e31a58f3aadcd3cc9fe97ac609a4fb82005e984badc91cbe9ab0594cc0698f8cf7f2687a919fdfd8492455cb20f485ed9bf7113483e8612b793be23e22673b9d7d40c0133e70cf8baf6b00537d18572976c06fb7650179b45cd92a8c22ba0686bd5091a5c6c86fe738fe59f995acaf01", 0xc1) 09:58:04 executing program 0: 09:58:04 executing program 2: r0 = socket(0x2, 0x923a8ed2b42d59dd, 0x1f) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 428.757181][T26355] XFS (loop5): Invalid superblock magic number 09:58:04 executing program 0: [ 429.071732][T26355] XFS (loop5): Invalid superblock magic number 09:58:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:04 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x2be18985ea97b234) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000180)) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x6, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) ioctl$TCXONC(r1, 0x540a, 0x9) 09:58:04 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:04 executing program 0: 09:58:04 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:04 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x800, 0x10) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xbf, "2cc34f74ac0ab838f3786acbbf9cfceb9ff378f3a3ece5f1fa0a4ea478bd604cb15f56c65f5238321dc5138ba2146af800523dd7e5e64889163aaca7e7eb6be5221d8b3d65f9cd96c758c39f9d5aa9315f5511c43811265b8057a2b8d8a531447bd3a065d443e2feb06fde8ea4e2d27fad4199a80108964340e6d94be32e8155accb8cc40eece4d9a1f543e1328442590192c848e00efaa9503043f36bddae89f927599791a6166160034c40424afe48f60d898076bdce8c883a344f4e167e"}, &(0x7f0000000480)=0xc7) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r2, 0x4}, 0x8) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x80080, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x80000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xed) write$rfkill(r3, &(0x7f0000000200)={0x3f, 0x3, 0x0, 0x1}, 0x8) 09:58:04 executing program 0: 09:58:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.events\x00', 0x0, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz1\x00', {0x8, 0x5, 0x7, 0x5}, 0x3, [0x9, 0x7, 0xfba1, 0x400, 0x2, 0x7ff, 0x0, 0x1b95, 0x9, 0x15, 0xfffffffffffffffe, 0x88, 0x7, 0x9b9, 0x8, 0x6, 0x3, 0x2, 0x998, 0x8001, 0x1000, 0x800000, 0x7, 0x7, 0x78d6, 0x7, 0x81, 0x9, 0x7, 0xa657, 0x6, 0x4, 0xe000000000, 0x8, 0xffffffff, 0x0, 0x504, 0x1, 0x41c, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x7, 0x7f, 0x7ff, 0x2, 0x100000001, 0x5, 0x2, 0x80000001, 0x7fff, 0x1, 0x9, 0xfff, 0x2b, 0x7, 0x3, 0x1, 0x80000001], [0x6, 0x1, 0x9, 0x23, 0x1f, 0x8, 0xeb, 0x10000, 0x0, 0x1, 0xffffffff7fffffff, 0x7, 0x0, 0xfff, 0xffffffff, 0x9, 0x2, 0x0, 0x7fffffff, 0x3, 0x10001, 0xf468, 0xffffffffffffff7f, 0x5667, 0x5, 0x1, 0x100000001, 0x6, 0x0, 0xdff, 0x6, 0x100000004, 0x0, 0x1, 0x400, 0xb430, 0x6, 0xff, 0x80000001, 0x5, 0x8000, 0x46, 0x3, 0x2, 0x10001, 0x6e20b214, 0x7, 0x4, 0x39, 0x8000, 0xfffffffffffffffc, 0x8001, 0x4, 0x0, 0x7, 0x80000001, 0x7f, 0xffffffffffffff01, 0x2, 0xfffffffffffffffd, 0xffffffff80000000, 0x1f, 0x4, 0xffff], [0x100, 0x7fff, 0x2, 0x4, 0x0, 0x8, 0xffffffffffffff00, 0x40, 0x7fffffff, 0x82, 0xfff, 0x7, 0x5, 0x3f, 0x2, 0x0, 0x7, 0xa11, 0x9, 0x5cd, 0x1e78000000000000, 0x20, 0x5, 0x5, 0xffffffff, 0x1, 0x6, 0x4, 0x4, 0x7, 0x0, 0x8001, 0x8, 0x0, 0xfffffffffffff9f7, 0xd1, 0x6, 0x8, 0x9, 0x1bd, 0x4, 0xff, 0x1, 0x3ff, 0x6, 0x5, 0x0, 0x80, 0x80000000, 0xe99b, 0x7, 0x80000000, 0x62, 0x3, 0x800, 0xa974, 0x1c31, 0x1800, 0x7fffffff, 0x1, 0xf2, 0x5, 0x3, 0x7], [0x7, 0x100000001, 0x3, 0x800, 0x1, 0x800, 0x5, 0xfffffffffffffff9, 0x0, 0x8, 0xfffffffffffffff7, 0xdc2d, 0x2, 0x3, 0x5, 0x0, 0x5c5b, 0x7, 0x4, 0xee, 0x7a9fcd35, 0x9, 0x1f, 0x8, 0x0, 0x85e6, 0xfffffffffffffffb, 0xcb, 0x1f, 0x9f5, 0x1, 0x6, 0x200, 0x7, 0x2, 0x8, 0x7ff, 0xa2db, 0x2, 0x0, 0x4, 0x400, 0x7c5, 0x9, 0x3, 0x4d9, 0xa3, 0xc21, 0x80, 0x8001, 0x0, 0x8001, 0xffffffffffffff7f, 0x7, 0x2, 0xfffffffffffffe01, 0x8001, 0x5, 0x3, 0x4, 0x6, 0x3, 0x5, 0x1ff]}, 0x45c) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140)=0x7, 0x4) [ 429.517672][T26417] XFS (loop4): Invalid superblock magic number [ 429.540124][T26413] XFS (loop1): Invalid superblock magic number 09:58:04 executing program 0: [ 429.581923][T26424] XFS (loop5): Invalid superblock magic number 09:58:04 executing program 2: r0 = socket(0xa, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f00000001c0), 0x10) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) accept4$rose(r0, &(0x7f0000000140)=@short={0xb, @dev, @default, 0x1, @default}, &(0x7f0000000180)=0x1c, 0xda559fd5ed9db03a) 09:58:04 executing program 0: 09:58:05 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:05 executing program 2: r0 = socket(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000140), &(0x7f0000000180)=0x30) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:58:05 executing program 0: 09:58:05 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:05 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:05 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:05 executing program 0: 09:58:05 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x940, 0x0, 0x2, 0x19, 0x1c, "907ce7cdd05e3a905547cbb50588a46cc7cd53a5bdf8a74c0ead8d3f8a4765918a4982bd7ac0c590c29ead27fad547a3e0bdbf73a91b2f1e53d86af70d4338b5", "f8ce1be9f9ba4f78363bbfc0818a0d421e3daac28962d872d1e3cc639cad6286a8607fc95021f4a001ffe746666e0fdc29d834bc3b0acf60a810ab0922530f42", "acc79efcac59744884076c5e82586fdb3adeb4ac94ad429fb700040408c7eedf", [0x7, 0x8001]}) r1 = socket(0x9, 0x1, 0x3) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) [ 430.370719][T26489] XFS (loop4): Invalid superblock magic number [ 430.399167][T26494] XFS (loop1): Invalid superblock magic number 09:58:05 executing program 0: [ 430.409231][T26486] XFS (loop5): Invalid superblock magic number 09:58:05 executing program 2: 09:58:05 executing program 2: 09:58:05 executing program 0: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x2) [ 430.790184][T26486] XFS (loop5): Invalid superblock magic number 09:58:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:06 executing program 2: 09:58:06 executing program 0: 09:58:06 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:06 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:06 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:06 executing program 2: 09:58:06 executing program 0: [ 431.295073][T26562] XFS (loop4): Invalid superblock magic number [ 431.334013][T26559] XFS (loop1): Invalid superblock magic number 09:58:06 executing program 0: 09:58:06 executing program 2: [ 431.356902][T26564] XFS (loop5): Invalid superblock magic number 09:58:06 executing program 0: 09:58:06 executing program 2: 09:58:07 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:07 executing program 0: 09:58:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x5, 0x4, 0xbbb, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f00000000c0)={r0, &(0x7f0000000080), 0x0}, 0x18) 09:58:07 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:07 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:07 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:07 executing program 0: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x3ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000040)="056b93fcf607d92373f7110574e6bea7afe3c349dc3039cf961f4e", 0x1b) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0x5}, 0x16d) sendmsg$unix(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, &(0x7f0000000100)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x374) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 09:58:07 executing program 2: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 432.225265][T26626] XFS (loop1): Invalid superblock magic number [ 432.268698][T26631] XFS (loop4): Invalid superblock magic number [ 432.294153][T26656] net_ratelimit: 12 callbacks suppressed [ 432.294160][T26656] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 09:58:07 executing program 2: mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_settime(0x5, &(0x7f0000000100)) fstat(r0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x4028, &(0x7f0000000480)={'trans=unix,', {[{@dfltgid={'dfltgid'}}, {@privport='privport'}], [{@dont_measure='dont_measure'}, {@uid_eq={'uid'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@pcr={'pcr', 0x3d, 0x29}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/vcs#\x00'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r3, 0xc0305616, &(0x7f0000000200)={0x0, {0x8, 0x7}}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000140)={0x6, 0x0, 0x1014, 0x239, 0x200, {0xa479, 0x3f}, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) bind$bt_hci(r2, &(0x7f0000000600), 0xc) listen(r4, 0x8) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x62, 0x8000) r6 = accept4(r4, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_INITMSG(r6, 0x84, 0x2, 0x0, 0xffb3) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x3000000, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000080)) 09:58:07 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) [ 432.313608][T26643] XFS (loop5): Invalid superblock magic number [ 432.316819][T26669] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 09:58:07 executing program 0: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 432.580492][T26626] XFS (loop1): Invalid superblock magic number 09:58:08 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 432.928846][T26700] XFS (loop0): Invalid superblock magic number 09:58:08 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x7}], 0x1, 0x0, 0x0) 09:58:08 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:08 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 433.185902][T26711] XFS (loop4): Invalid superblock magic number 09:58:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000180)={0x81, "0f14f2b58e2b611564c265b7b5600f27d64c391411aded6788db5ea3f633b7dc", 0x3, 0x100, 0x1ff, 0x8, 0x4, 0x4, 0xa99, 0x6a61}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 433.318635][T26739] XFS (loop5): Invalid superblock magic number [ 433.353927][T26728] XFS (loop1): Invalid superblock magic number 09:58:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000180)={0x81, "0f14f2b58e2b611564c265b7b5600f27d64c391411aded6788db5ea3f633b7dc", 0x3, 0x100, 0x1ff, 0x8, 0x4, 0x4, 0xa99, 0x6a61}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 433.375328][T26735] XFS (loop2): Invalid superblock magic number 09:58:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000180)={0x81, "0f14f2b58e2b611564c265b7b5600f27d64c391411aded6788db5ea3f633b7dc", 0x3, 0x100, 0x1ff, 0x8, 0x4, 0x4, 0xa99, 0x6a61}) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:08 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 433.618264][T26739] XFS (loop5): Invalid superblock magic number 09:58:08 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:58:09 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x10}], 0x1, 0x0, 0x0) 09:58:09 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:09 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfsX', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:09 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:09 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 434.113951][T26811] XFS (loop1): Invalid superblock magic number [ 434.151634][T26803] XFS (loop4): Invalid superblock magic number 09:58:09 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:09 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:09 executing program 0: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:09 executing program 0: r0 = socket(0x0, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 434.433578][T26846] XFS (loop5): Invalid superblock magic number [ 434.521333][T26803] XFS (loop4): Invalid superblock magic number 09:58:09 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0xff6a) 09:58:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:10 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x700}], 0x1, 0x0, 0x0) 09:58:10 executing program 0: r0 = socket(0x0, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:10 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:10 executing program 0: r0 = socket(0x0, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 435.078141][T26900] XFS (loop1): Invalid superblock magic number [ 435.083741][T26891] XFS (loop2): Invalid superblock magic number 09:58:10 executing program 0: r0 = socket(0xa, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 435.135470][T26903] XFS (loop4): Invalid superblock magic number [ 435.170882][T26928] XFS (loop5): Invalid superblock magic number 09:58:10 executing program 0: r0 = socket(0xa, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:10 executing program 0: r0 = socket(0xa, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:10 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:10 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:10 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 435.705166][T26971] XFS (loop1): Invalid superblock magic number 09:58:11 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x1f00}], 0x1, 0x0, 0x0) 09:58:11 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0x8dffffff00000000}}], 0x1, 0x0, 0x0) 09:58:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:11 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 435.994264][T26993] XFS (loop4): Invalid superblock magic number [ 436.001054][T26994] XFS (loop5): Invalid superblock magic number 09:58:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:11 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xff', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:11 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:11 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x3f00}], 0x1, 0x0, 0x0) 09:58:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfsB', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:12 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:12 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}}, 0xff6a) 09:58:12 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:12 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 436.959932][T27073] XFS (loop1): Invalid superblock magic number [ 436.971716][T27083] XFS (loop4): Invalid superblock magic number 09:58:12 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:12 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:12 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 437.234393][T27105] XFS (loop2): Invalid superblock magic number 09:58:12 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xff', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 437.404893][T27114] XFS (loop5): Invalid superblock magic number 09:58:12 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsX', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:13 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x4000}], 0x1, 0x0, 0x0) 09:58:13 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:13 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 437.851611][T27156] XFS (loop2): Invalid superblock magic number 09:58:13 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 437.969972][T27163] XFS (loop1): Invalid superblock magic number 09:58:13 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:13 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:13 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, 0x0, 0x0) 09:58:13 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, 0x0, 0x0) 09:58:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1, 0x0, 0x0, 0xfffffdef}}], 0x1, 0x0, 0x0) 09:58:13 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, 0x0, 0x0) [ 438.278245][T27189] XFS (loop5): Invalid superblock magic number [ 438.305510][T27200] XFS (loop4): Invalid superblock magic number 09:58:13 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:13 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x40000}], 0x1, 0x0, 0x0) 09:58:14 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}}, 0xff6a) 09:58:14 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 438.698907][T27233] XFS (loop1): Invalid superblock magic number 09:58:14 executing program 0 (fault-call:2 fault-nth:0): r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 438.831071][T27268] FAULT_INJECTION: forcing a failure. [ 438.831071][T27268] name failslab, interval 1, probability 0, space 0, times 0 [ 438.843953][T27268] CPU: 1 PID: 27268 Comm: syz-executor.0 Not tainted 5.3.0-rc3-next-20190809 #63 [ 438.853074][T27268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.863218][T27268] Call Trace: [ 438.866510][T27268] dump_stack+0x172/0x1f0 [ 438.870840][T27268] should_fail.cold+0xa/0x15 [ 438.875426][T27268] ? lock_downgrade+0x920/0x920 [ 438.880276][T27268] ? fault_create_debugfs_attr+0x180/0x180 [ 438.886173][T27268] ? is_bpf_text_address+0xac/0x170 [ 438.891457][T27268] __should_failslab+0x121/0x190 [ 438.895349][T27258] XFS (loop5): Invalid superblock magic number [ 438.896385][T27268] should_failslab+0x9/0x14 [ 438.896398][T27268] kmem_cache_alloc+0x47/0x710 [ 438.896420][T27268] ? __kasan_check_read+0x11/0x20 [ 438.916988][T27268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.923233][T27268] ? refcount_inc_not_zero_checked+0x144/0x200 [ 438.929386][T27268] dst_alloc+0x10e/0x200 [ 438.933613][T27268] ip6_dst_alloc+0x34/0xa0 [ 438.938025][T27268] ip6_create_rt_rcu+0x1e9/0x470 [ 438.942959][T27268] ? ip6_rt_copy_init+0xe90/0xe90 [ 438.947980][T27268] ? ip6_pol_route_lookup+0x130/0x1240 [ 438.953456][T27268] ip6_pol_route_lookup+0xb04/0x1240 [ 438.958751][T27268] ? fib6_select_path+0x930/0x930 [ 438.963795][T27268] ? save_stack+0x5c/0x90 [ 438.968109][T27268] ? save_stack+0x23/0x90 [ 438.972428][T27268] ? __kasan_slab_free+0x102/0x150 [ 438.977535][T27268] ? kasan_slab_free+0xe/0x10 [ 438.982279][T27268] ? kfree+0x10a/0x2c0 [ 438.986354][T27268] ? tomoyo_check_open_permission+0x19e/0x3f0 [ 438.992419][T27268] ? tomoyo_file_open+0xa9/0xd0 [ 438.997253][T27268] ? security_file_open+0x71/0x300 [ 439.002355][T27268] ? vfs_open+0xa0/0xd0 [ 439.006519][T27268] fib6_rule_lookup+0x133/0x7a0 [ 439.011367][T27268] ? fib6_select_path+0x930/0x930 [ 439.016391][T27268] ? fib6_lookup+0x340/0x340 [ 439.020980][T27268] ? mark_held_locks+0xf0/0xf0 [ 439.025735][T27268] ? mark_held_locks+0xf0/0xf0 [ 439.030505][T27268] ? lock_acquire+0x190/0x410 [ 439.035181][T27268] ? rtnl_lock+0x17/0x20 [ 439.039445][T27268] rt6_lookup+0x1b4/0x280 [ 439.043770][T27268] ? dst_discard+0x50/0x50 [ 439.048169][T27268] ? mark_held_locks+0xf0/0xf0 [ 439.052943][T27268] ? lock_acquire+0x190/0x410 [ 439.057627][T27268] ? ip6_mc_source+0x132/0x15b0 [ 439.062472][T27268] ip6_mc_find_dev_rcu+0x45/0x230 [ 439.067502][T27268] ip6_mc_source+0x1ce/0x15b0 [ 439.072174][T27268] ? _copy_from_user+0x12c/0x1a0 [ 439.077095][T27268] do_ipv6_setsockopt.isra.0+0x37b5/0x4120 [ 439.082887][T27268] ? ipv6_update_options+0x3b0/0x3b0 [ 439.088157][T27268] ? lock_downgrade+0x920/0x920 [ 439.093018][T27268] ? __bpf_address_lookup+0x310/0x310 [ 439.098391][T27268] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 439.104095][T27268] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 439.109537][T27268] ? is_bpf_text_address+0xd3/0x170 [ 439.114728][T27268] ? kernel_text_address+0x73/0xf0 [ 439.119851][T27268] ? __kernel_text_address+0xd/0x40 [ 439.125042][T27268] ? unwind_get_return_address+0x61/0xa0 [ 439.130669][T27268] ? profile_setup.cold+0xbb/0xbb [ 439.135682][T27268] ? arch_stack_walk+0x97/0xf0 [ 439.140457][T27268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.146693][T27268] ? _parse_integer+0x139/0x190 [ 439.151556][T27268] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 439.157972][T27268] ? _kstrtoull+0x14c/0x200 [ 439.162485][T27268] ? _parse_integer+0x190/0x190 [ 439.167330][T27268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 439.173563][T27268] ? aa_label_sk_perm+0x101/0x560 [ 439.178570][T27268] ? lock_downgrade+0x920/0x920 [ 439.183408][T27268] ? aa_profile_af_perm+0x320/0x320 [ 439.188623][T27268] ? __might_sleep+0x95/0x190 [ 439.193295][T27268] ipv6_setsockopt+0xf6/0x170 [ 439.197949][T27268] ? ipv6_setsockopt+0xf6/0x170 [ 439.202788][T27268] tcp_setsockopt+0x8f/0xe0 [ 439.207306][T27268] sock_common_setsockopt+0x94/0xd0 [ 439.212503][T27268] __sys_setsockopt+0x261/0x4c0 [ 439.217349][T27268] ? sock_create_kern+0x50/0x50 [ 439.222203][T27268] ? fput+0x1b/0x20 [ 439.226021][T27268] ? switch_fpu_return+0x1fa/0x4f0 09:58:14 executing program 2 (fault-call:10 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 439.231134][T27268] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 439.237207][T27268] __x64_sys_setsockopt+0xbe/0x150 [ 439.242333][T27268] do_syscall_64+0xfa/0x760 [ 439.246839][T27268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.252750][T27268] RIP: 0033:0x459829 [ 439.256643][T27268] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.276245][T27268] RSP: 002b:00007efd63f09c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 439.284652][T27268] RAX: ffffffffffffffda RBX: 00007efd63f09c90 RCX: 0000000000459829 [ 439.292602][T27268] RDX: 000000000000002f RSI: 0000000000000029 RDI: 0000000000000003 [ 439.300553][T27268] RBP: 000000000075bf20 R08: 0000000000000108 R09: 0000000000000000 [ 439.308501][T27268] R10: 0000000020000000 R11: 0000000000000246 R12: 00007efd63f0a6d4 [ 439.316468][T27268] R13: 00000000004cf028 R14: 00000000004ddb88 R15: 0000000000000004 09:58:14 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:14 executing program 0 (fault-call:2 fault-nth:1): r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 439.405100][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 439.410929][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 439.430724][T27276] FAULT_INJECTION: forcing a failure. [ 439.430724][T27276] name failslab, interval 1, probability 0, space 0, times 0 [ 439.480588][T27276] CPU: 0 PID: 27276 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 439.489728][T27276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.499812][T27276] Call Trace: [ 439.503119][T27276] dump_stack+0x172/0x1f0 [ 439.507464][T27276] should_fail.cold+0xa/0x15 [ 439.512223][T27276] ? release_sock+0x156/0x1c0 [ 439.516909][T27276] ? fault_create_debugfs_attr+0x180/0x180 [ 439.516928][T27276] ? page_to_nid.part.0+0x20/0x20 09:58:14 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 439.516951][T27276] ? ___might_sleep+0x163/0x280 [ 439.527760][T27276] __should_failslab+0x121/0x190 [ 439.527776][T27276] should_failslab+0x9/0x14 [ 439.527787][T27276] kmem_cache_alloc_node+0x268/0x740 [ 439.527808][T27276] __alloc_skb+0xd5/0x5e0 [ 439.527829][T27276] ? netdev_alloc_frag+0x1b0/0x1b0 [ 439.557651][T27276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.563900][T27276] ? netlink_autobind.isra.0+0x228/0x310 [ 439.569543][T27276] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 439.575799][T27276] netlink_sendmsg+0x972/0xd60 [ 439.580577][T27276] ? netlink_unicast+0x710/0x710 [ 439.585531][T27276] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 439.585548][T27276] ? apparmor_socket_sendmsg+0x2a/0x30 [ 439.585563][T27276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.585576][T27276] ? security_socket_sendmsg+0x8d/0xc0 [ 439.585598][T27276] ? netlink_unicast+0x710/0x710 [ 439.596598][T27276] sock_sendmsg+0xd7/0x130 [ 439.596615][T27276] kernel_sendmsg+0x44/0x50 [ 439.596630][T27276] sock_no_sendpage+0x116/0x150 [ 439.596643][T27276] ? sock_kzfree_s+0x70/0x70 [ 439.596665][T27276] ? mark_held_locks+0xf0/0xf0 [ 439.636565][T27276] ? lock_acquire+0x190/0x410 [ 439.641251][T27276] ? pipe_lock+0x6e/0x80 [ 439.645508][T27276] kernel_sendpage+0x92/0xf0 [ 439.650276][T27276] ? sock_kzfree_s+0x70/0x70 [ 439.654874][T27276] sock_sendpage+0x8b/0xc0 [ 439.659381][T27276] pipe_to_sendpage+0x296/0x360 [ 439.664248][T27276] ? kernel_sendpage+0xf0/0xf0 [ 439.669012][T27276] ? direct_splice_actor+0x190/0x190 [ 439.674304][T27276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 09:58:15 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x6, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 439.680549][T27276] ? splice_from_pipe_next.part.0+0x262/0x300 [ 439.686617][T27276] __splice_from_pipe+0x397/0x7d0 [ 439.691644][T27276] ? direct_splice_actor+0x190/0x190 [ 439.696937][T27276] ? direct_splice_actor+0x190/0x190 [ 439.702234][T27276] splice_from_pipe+0x108/0x170 [ 439.707081][T27276] ? splice_shrink_spd+0xd0/0xd0 [ 439.707100][T27276] ? apparmor_file_permission+0x25/0x30 [ 439.707125][T27276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.717576][T27276] ? security_file_permission+0x8f/0x380 [ 439.717594][T27276] generic_splice_sendpage+0x3c/0x50 [ 439.717607][T27276] ? splice_from_pipe+0x170/0x170 [ 439.717625][T27276] do_splice+0x708/0x1410 [ 439.744048][T27276] ? opipe_prep.part.0+0x2e0/0x2e0 [ 439.749171][T27276] ? __fget_light+0x1a9/0x230 [ 439.753863][T27276] __x64_sys_splice+0x2c6/0x330 [ 439.758730][T27276] do_syscall_64+0xfa/0x760 [ 439.763246][T27276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.769142][T27276] RIP: 0033:0x459829 09:58:15 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 439.773044][T27276] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.792647][T27276] RSP: 002b:00007f283866ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 439.801059][T27276] RAX: ffffffffffffffda RBX: 00007f283866ac90 RCX: 0000000000459829 [ 439.809112][T27276] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 439.809120][T27276] RBP: 000000000075bfc8 R08: 00000000000002b1 R09: 0000000000000000 09:58:15 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xff', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 439.809127][T27276] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f283866b6d4 [ 439.809134][T27276] R13: 00000000004c8fe8 R14: 00000000004df430 R15: 0000000000000007 09:58:15 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x100000}], 0x1, 0x0, 0x0) [ 439.877873][T27279] XFS (loop4): Invalid superblock magic number 09:58:15 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:15 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:15 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xf9', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 440.095731][T27316] XFS (loop5): Invalid superblock magic number 09:58:15 executing program 2 (fault-call:10 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 440.202601][T27279] XFS (loop4): Invalid superblock magic number [ 440.358780][T27354] FAULT_INJECTION: forcing a failure. [ 440.358780][T27354] name failslab, interval 1, probability 0, space 0, times 0 [ 440.371649][T27354] CPU: 0 PID: 27354 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 440.380763][T27354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.390820][T27354] Call Trace: [ 440.394106][T27354] dump_stack+0x172/0x1f0 [ 440.398488][T27354] should_fail.cold+0xa/0x15 [ 440.403080][T27354] ? __kasan_check_read+0x11/0x20 [ 440.408084][T27354] ? fault_create_debugfs_attr+0x180/0x180 [ 440.413904][T27354] ? page_to_nid.part.0+0x20/0x20 [ 440.424142][T27354] ? ___might_sleep+0x163/0x280 [ 440.429000][T27354] __should_failslab+0x121/0x190 [ 440.433925][T27354] should_failslab+0x9/0x14 [ 440.438411][T27354] kmem_cache_alloc_node_trace+0x274/0x750 [ 440.444200][T27354] ? kasan_unpoison_shadow+0x35/0x50 [ 440.449464][T27354] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 440.455253][T27354] __kmalloc_node_track_caller+0x3d/0x70 [ 440.460878][T27354] __kmalloc_reserve.isra.0+0x40/0xf0 [ 440.466229][T27354] __alloc_skb+0x10b/0x5e0 [ 440.470642][T27354] ? netdev_alloc_frag+0x1b0/0x1b0 [ 440.475748][T27354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.481992][T27354] ? netlink_autobind.isra.0+0x228/0x310 [ 440.487613][T27354] ? security_socket_getpeersec_dgram+0x8d/0xc0 [ 440.493834][T27354] netlink_sendmsg+0x972/0xd60 [ 440.498580][T27354] ? netlink_unicast+0x710/0x710 [ 440.503495][T27354] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 440.509022][T27354] ? apparmor_socket_sendmsg+0x2a/0x30 [ 440.514460][T27354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.520684][T27354] ? security_socket_sendmsg+0x8d/0xc0 [ 440.526124][T27354] ? netlink_unicast+0x710/0x710 [ 440.531060][T27354] sock_sendmsg+0xd7/0x130 [ 440.535457][T27354] kernel_sendmsg+0x44/0x50 [ 440.539939][T27354] sock_no_sendpage+0x116/0x150 [ 440.544768][T27354] ? sock_kzfree_s+0x70/0x70 [ 440.549337][T27354] ? mark_held_locks+0xf0/0xf0 [ 440.554080][T27354] ? lock_acquire+0x190/0x410 [ 440.558733][T27354] ? pipe_lock+0x6e/0x80 [ 440.562956][T27354] kernel_sendpage+0x92/0xf0 [ 440.567539][T27354] ? sock_kzfree_s+0x70/0x70 [ 440.572108][T27354] sock_sendpage+0x8b/0xc0 [ 440.576503][T27354] pipe_to_sendpage+0x296/0x360 [ 440.581331][T27354] ? kernel_sendpage+0xf0/0xf0 [ 440.586099][T27354] ? direct_splice_actor+0x190/0x190 [ 440.591388][T27354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.597642][T27354] ? splice_from_pipe_next.part.0+0x262/0x300 [ 440.603687][T27354] __splice_from_pipe+0x397/0x7d0 [ 440.608691][T27354] ? direct_splice_actor+0x190/0x190 [ 440.613967][T27354] ? direct_splice_actor+0x190/0x190 [ 440.619248][T27354] splice_from_pipe+0x108/0x170 [ 440.624083][T27354] ? splice_shrink_spd+0xd0/0xd0 [ 440.628999][T27354] ? apparmor_file_permission+0x25/0x30 [ 440.634525][T27354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.640755][T27354] ? security_file_permission+0x8f/0x380 [ 440.646369][T27354] generic_splice_sendpage+0x3c/0x50 [ 440.651721][T27354] ? splice_from_pipe+0x170/0x170 [ 440.656725][T27354] do_splice+0x708/0x1410 [ 440.661037][T27354] ? opipe_prep.part.0+0x2e0/0x2e0 [ 440.666127][T27354] ? __fget_light+0x1a9/0x230 [ 440.670784][T27354] __x64_sys_splice+0x2c6/0x330 [ 440.675659][T27354] do_syscall_64+0xfa/0x760 [ 440.680162][T27354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.686038][T27354] RIP: 0033:0x459829 [ 440.689915][T27354] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.709499][T27354] RSP: 002b:00007f283866ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 440.717888][T27354] RAX: ffffffffffffffda RBX: 00007f283866ac90 RCX: 0000000000459829 [ 440.725840][T27354] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 440.733791][T27354] RBP: 000000000075bfc8 R08: 00000000000002b1 R09: 0000000000000000 [ 440.741744][T27354] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f283866b6d4 [ 440.749695][T27354] R13: 00000000004c8fe8 R14: 00000000004df430 R15: 0000000000000007 [ 440.765076][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 440.765107][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 440.770856][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 440.782348][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 440.788144][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 440.793862][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 440.799661][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 440.805432][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:16 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:16 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x5, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:16 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xff', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x1000000}], 0x1, 0x0, 0x0) 09:58:16 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:16 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:16 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x8, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:16 executing program 2 (fault-call:10 fault-nth:2): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:58:16 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0xb, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 441.311330][T27402] FAULT_INJECTION: forcing a failure. [ 441.311330][T27402] name failslab, interval 1, probability 0, space 0, times 0 [ 441.336122][T27402] CPU: 1 PID: 27402 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 441.345255][T27402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.355308][T27402] Call Trace: [ 441.358599][T27402] dump_stack+0x172/0x1f0 [ 441.362954][T27402] should_fail.cold+0xa/0x15 [ 441.367525][T27402] ? __kasan_check_read+0x11/0x20 [ 441.372539][T27402] ? fault_create_debugfs_attr+0x180/0x180 [ 441.378427][T27402] ? netlink_remove_tap+0x4d0/0x4d0 [ 441.383655][T27402] __should_failslab+0x121/0x190 [ 441.388609][T27402] should_failslab+0x9/0x14 [ 441.393097][T27402] kmem_cache_alloc+0x47/0x710 [ 441.397868][T27402] ? lock_acquire+0x190/0x410 [ 441.402548][T27402] ? netlink_deliver_tap+0x146/0xbf0 09:58:16 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x10, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 441.407835][T27402] skb_clone+0x154/0x3d0 [ 441.412100][T27402] netlink_deliver_tap+0x94d/0xbf0 [ 441.417225][T27402] netlink_unicast+0x5a2/0x710 [ 441.421994][T27402] ? netlink_attachskb+0x7c0/0x7c0 [ 441.427102][T27402] ? _copy_from_iter_full+0x25d/0x8a0 [ 441.432457][T27402] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 441.438162][T27402] ? __check_object_size+0x3d/0x437 [ 441.443782][T27402] netlink_sendmsg+0x8a5/0xd60 [ 441.448543][T27402] ? netlink_unicast+0x710/0x710 [ 441.453477][T27402] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 441.459008][T27402] ? apparmor_socket_sendmsg+0x2a/0x30 [ 441.461628][T27388] XFS (loop5): Invalid superblock magic number [ 441.464457][T27402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.464473][T27402] ? security_socket_sendmsg+0x8d/0xc0 [ 441.464489][T27402] ? netlink_unicast+0x710/0x710 [ 441.464506][T27402] sock_sendmsg+0xd7/0x130 [ 441.464533][T27402] kernel_sendmsg+0x44/0x50 [ 441.496118][T27402] sock_no_sendpage+0x116/0x150 [ 441.500962][T27402] ? sock_kzfree_s+0x70/0x70 [ 441.505555][T27402] ? mark_held_locks+0xf0/0xf0 [ 441.510302][T27402] ? lock_acquire+0x190/0x410 [ 441.514963][T27402] ? pipe_lock+0x6e/0x80 [ 441.519201][T27402] kernel_sendpage+0x92/0xf0 [ 441.523768][T27402] ? sock_kzfree_s+0x70/0x70 [ 441.528345][T27402] sock_sendpage+0x8b/0xc0 [ 441.532742][T27402] pipe_to_sendpage+0x296/0x360 [ 441.537576][T27402] ? kernel_sendpage+0xf0/0xf0 [ 441.542330][T27402] ? direct_splice_actor+0x190/0x190 [ 441.547616][T27402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.553840][T27402] ? splice_from_pipe_next.part.0+0x262/0x300 [ 441.559888][T27402] __splice_from_pipe+0x397/0x7d0 [ 441.564906][T27402] ? direct_splice_actor+0x190/0x190 [ 441.570191][T27402] ? direct_splice_actor+0x190/0x190 [ 441.575485][T27402] splice_from_pipe+0x108/0x170 [ 441.580323][T27402] ? splice_shrink_spd+0xd0/0xd0 [ 441.585268][T27402] ? apparmor_file_permission+0x25/0x30 [ 441.590906][T27402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.597164][T27402] ? security_file_permission+0x8f/0x380 [ 441.602804][T27402] generic_splice_sendpage+0x3c/0x50 [ 441.608081][T27402] ? splice_from_pipe+0x170/0x170 [ 441.613104][T27402] do_splice+0x708/0x1410 [ 441.617436][T27402] ? opipe_prep.part.0+0x2e0/0x2e0 [ 441.622538][T27402] ? __fget_light+0x1a9/0x230 [ 441.627215][T27402] __x64_sys_splice+0x2c6/0x330 [ 441.632060][T27402] do_syscall_64+0xfa/0x760 [ 441.636546][T27402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.642414][T27402] RIP: 0033:0x459829 [ 441.646293][T27402] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.665890][T27402] RSP: 002b:00007f283866ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 441.674310][T27402] RAX: ffffffffffffffda RBX: 00007f283866ac90 RCX: 0000000000459829 [ 441.682294][T27402] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 441.690263][T27402] RBP: 000000000075bfc8 R08: 00000000000002b1 R09: 0000000000000000 [ 441.698232][T27402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f283866b6d4 09:58:17 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x7f', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 441.706183][T27402] R13: 00000000004c8fe8 R14: 00000000004df430 R15: 0000000000000007 [ 441.743686][T27380] XFS (loop4): Invalid superblock magic number 09:58:17 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x11, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:17 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x7000000}], 0x1, 0x0, 0x0) 09:58:17 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x12, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:17 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x8c', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:17 executing program 2 (fault-call:10 fault-nth:3): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:58:17 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:17 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x13, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:17 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x14, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 442.299038][T27468] FAULT_INJECTION: forcing a failure. [ 442.299038][T27468] name failslab, interval 1, probability 0, space 0, times 0 [ 442.311706][T27468] CPU: 1 PID: 27468 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 442.320811][T27468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.330871][T27468] Call Trace: [ 442.334170][T27468] dump_stack+0x172/0x1f0 [ 442.338513][T27468] should_fail.cold+0xa/0x15 [ 442.343135][T27468] ? fault_create_debugfs_attr+0x180/0x180 [ 442.349500][T27468] __should_failslab+0x121/0x190 [ 442.354430][T27468] should_failslab+0x9/0x14 [ 442.358944][T27468] kmem_cache_alloc+0x47/0x710 [ 442.363707][T27468] ? lock_acquire+0x190/0x410 [ 442.365336][T27456] XFS (loop4): Invalid superblock magic number [ 442.368372][T27468] ? napi_disable+0xe0/0xe0 [ 442.368388][T27468] skb_clone+0x154/0x3d0 [ 442.368405][T27468] dev_queue_xmit_nit+0x342/0x990 [ 442.368420][T27468] ? validate_xmit_xfrm+0x43c/0xf10 [ 442.368434][T27468] ? __splice_from_pipe+0x397/0x7d0 [ 442.368457][T27468] dev_hard_start_xmit+0xbb/0x9c0 [ 442.403726][T27468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.409947][T27468] __dev_queue_xmit+0x2b15/0x3650 [ 442.415130][T27468] ? __netlink_lookup+0x3fa/0x7b0 [ 442.423249][T27468] ? __kasan_check_read+0x11/0x20 [ 442.428255][T27468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.434479][T27468] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 442.439757][T27468] ? __copy_skb_header+0x270/0x550 [ 442.444872][T27468] ? __skb_checksum_complete+0x3f0/0x3f0 [ 442.450514][T27468] ? __kasan_check_write+0x14/0x20 [ 442.455618][T27468] ? __skb_clone+0x5c8/0x820 [ 442.460225][T27468] dev_queue_xmit+0x18/0x20 [ 442.464739][T27468] ? dev_queue_xmit+0x18/0x20 [ 442.469414][T27468] netlink_deliver_tap+0x8e2/0xbf0 [ 442.474518][T27468] netlink_unicast+0x5a2/0x710 [ 442.479292][T27468] ? netlink_attachskb+0x7c0/0x7c0 [ 442.484405][T27468] ? _copy_from_iter_full+0x25d/0x8a0 [ 442.489875][T27468] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 442.495595][T27468] ? __check_object_size+0x3d/0x437 [ 442.500787][T27468] netlink_sendmsg+0x8a5/0xd60 [ 442.505540][T27468] ? netlink_unicast+0x710/0x710 [ 442.510471][T27468] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 442.516031][T27468] ? apparmor_socket_sendmsg+0x2a/0x30 [ 442.521494][T27468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.527733][T27468] ? security_socket_sendmsg+0x8d/0xc0 [ 442.533176][T27468] ? netlink_unicast+0x710/0x710 [ 442.538096][T27468] sock_sendmsg+0xd7/0x130 [ 442.542491][T27468] kernel_sendmsg+0x44/0x50 [ 442.546976][T27468] sock_no_sendpage+0x116/0x150 [ 442.551819][T27468] ? sock_kzfree_s+0x70/0x70 [ 442.556417][T27468] ? mark_held_locks+0xf0/0xf0 [ 442.561186][T27468] ? lock_acquire+0x190/0x410 [ 442.565841][T27468] ? pipe_lock+0x6e/0x80 [ 442.570064][T27468] kernel_sendpage+0x92/0xf0 [ 442.574653][T27468] ? sock_kzfree_s+0x70/0x70 [ 442.579225][T27468] sock_sendpage+0x8b/0xc0 [ 442.583628][T27468] ? aa_file_perm+0x125/0xdd0 [ 442.588291][T27468] pipe_to_sendpage+0x296/0x360 [ 442.593122][T27468] ? kernel_sendpage+0xf0/0xf0 [ 442.597878][T27468] ? direct_splice_actor+0x190/0x190 [ 442.603189][T27468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.609411][T27468] ? splice_from_pipe_next.part.0+0x262/0x300 [ 442.615461][T27468] __splice_from_pipe+0x397/0x7d0 [ 442.620467][T27468] ? direct_splice_actor+0x190/0x190 [ 442.625747][T27468] ? direct_splice_actor+0x190/0x190 [ 442.631028][T27468] splice_from_pipe+0x108/0x170 [ 442.635868][T27468] ? splice_shrink_spd+0xd0/0xd0 [ 442.640803][T27468] ? apparmor_file_permission+0x25/0x30 [ 442.646327][T27468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.652558][T27468] ? security_file_permission+0x8f/0x380 [ 442.658200][T27468] generic_splice_sendpage+0x3c/0x50 [ 442.663480][T27468] ? splice_from_pipe+0x170/0x170 [ 442.668481][T27468] do_splice+0x708/0x1410 [ 442.672800][T27468] ? opipe_prep.part.0+0x2e0/0x2e0 [ 442.677929][T27468] ? __fget_light+0x1a9/0x230 [ 442.682595][T27468] __x64_sys_splice+0x2c6/0x330 [ 442.687447][T27468] do_syscall_64+0xfa/0x760 [ 442.691937][T27468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.697807][T27468] RIP: 0033:0x459829 [ 442.701685][T27468] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 442.721303][T27468] RSP: 002b:00007f283866ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 442.729694][T27468] RAX: ffffffffffffffda RBX: 00007f283866ac90 RCX: 0000000000459829 [ 442.737642][T27468] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 442.745598][T27468] RBP: 000000000075bfc8 R08: 00000000000002b1 R09: 0000000000000000 [ 442.753567][T27468] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f283866b6d4 [ 442.761517][T27468] R13: 00000000004c8fe8 R14: 00000000004df430 R15: 0000000000000007 09:58:18 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x15, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:18 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\xf6', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x1f000000}], 0x1, 0x0, 0x0) [ 442.892760][T27471] XFS (loop5): Invalid superblock magic number 09:58:18 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x16, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:18 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:18 executing program 2 (fault-call:10 fault-nth:4): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:58:18 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x17, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:18 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 443.240303][T27522] FAULT_INJECTION: forcing a failure. [ 443.240303][T27522] name failslab, interval 1, probability 0, space 0, times 0 [ 443.253601][T27522] CPU: 0 PID: 27522 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 443.262719][T27522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.272769][T27522] Call Trace: [ 443.276043][T27522] dump_stack+0x172/0x1f0 [ 443.280364][T27522] should_fail.cold+0xa/0x15 [ 443.284938][T27522] ? lock_acquire+0x190/0x410 [ 443.289600][T27522] ? fault_create_debugfs_attr+0x180/0x180 [ 443.295473][T27522] ? page_to_nid.part.0+0x20/0x20 [ 443.300487][T27522] ? ___might_sleep+0x163/0x280 [ 443.305351][T27522] __should_failslab+0x121/0x190 [ 443.310267][T27522] should_failslab+0x9/0x14 [ 443.314764][T27522] kmem_cache_alloc_node+0x268/0x740 [ 443.320032][T27522] ? mutex_lock_io_nested+0x1260/0x1260 [ 443.325555][T27522] ? lock_acquire+0x190/0x410 [ 443.330212][T27522] ? __netlink_dump_start+0x10c/0x7d0 [ 443.335586][T27522] __alloc_skb+0xd5/0x5e0 [ 443.339897][T27522] ? netdev_alloc_frag+0x1b0/0x1b0 [ 443.345003][T27522] ? lock_downgrade+0x920/0x920 [ 443.349848][T27522] ? __netlink_dump_start+0x10c/0x7d0 [ 443.355301][T27522] netlink_dump+0x71f/0xfa0 [ 443.359790][T27522] ? netlink_broadcast+0x50/0x50 [ 443.364712][T27522] __netlink_dump_start+0x5b1/0x7d0 [ 443.369894][T27522] packet_diag_handler_dump+0x212/0x2c0 [ 443.375450][T27522] ? pdiag_put_ring+0x310/0x310 [ 443.380280][T27522] ? sock_diag_rcv+0x1c/0x40 [ 443.384861][T27522] ? packet_diag_handler_dump+0x2c0/0x2c0 [ 443.390559][T27522] sock_diag_rcv_msg+0x319/0x410 [ 443.395502][T27522] netlink_rcv_skb+0x177/0x450 [ 443.400253][T27522] ? sock_diag_bind+0x80/0x80 [ 443.404910][T27522] ? netlink_ack+0xb30/0xb30 [ 443.409504][T27522] ? netlink_deliver_tap+0x254/0xbf0 [ 443.414768][T27522] sock_diag_rcv+0x2b/0x40 [ 443.419165][T27522] netlink_unicast+0x531/0x710 [ 443.423906][T27522] ? netlink_attachskb+0x7c0/0x7c0 [ 443.429010][T27522] ? _copy_from_iter_full+0x25d/0x8a0 [ 443.434363][T27522] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 443.440090][T27522] ? __check_object_size+0x3d/0x437 [ 443.445272][T27522] netlink_sendmsg+0x8a5/0xd60 [ 443.450032][T27522] ? netlink_unicast+0x710/0x710 [ 443.454949][T27522] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 443.460481][T27522] ? apparmor_socket_sendmsg+0x2a/0x30 [ 443.465924][T27522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.472154][T27522] ? security_socket_sendmsg+0x8d/0xc0 [ 443.477618][T27522] ? netlink_unicast+0x710/0x710 [ 443.482539][T27522] sock_sendmsg+0xd7/0x130 [ 443.486940][T27522] kernel_sendmsg+0x44/0x50 [ 443.491428][T27522] sock_no_sendpage+0x116/0x150 [ 443.496262][T27522] ? sock_kzfree_s+0x70/0x70 [ 443.500834][T27522] ? mark_held_locks+0xf0/0xf0 [ 443.505594][T27522] ? lock_acquire+0x190/0x410 [ 443.510268][T27522] ? pipe_lock+0x6e/0x80 [ 443.514497][T27522] kernel_sendpage+0x92/0xf0 [ 443.519097][T27522] ? sock_kzfree_s+0x70/0x70 [ 443.523706][T27522] sock_sendpage+0x8b/0xc0 [ 443.528106][T27522] pipe_to_sendpage+0x296/0x360 [ 443.532936][T27522] ? kernel_sendpage+0xf0/0xf0 [ 443.537681][T27522] ? direct_splice_actor+0x190/0x190 [ 443.542948][T27522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.549197][T27522] ? splice_from_pipe_next.part.0+0x262/0x300 [ 443.556166][T27522] __splice_from_pipe+0x397/0x7d0 [ 443.561169][T27522] ? direct_splice_actor+0x190/0x190 [ 443.566440][T27522] ? direct_splice_actor+0x190/0x190 [ 443.571715][T27522] splice_from_pipe+0x108/0x170 [ 443.576560][T27522] ? splice_shrink_spd+0xd0/0xd0 [ 443.581480][T27522] ? apparmor_file_permission+0x25/0x30 [ 443.587029][T27522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.593266][T27522] ? security_file_permission+0x8f/0x380 [ 443.598904][T27522] generic_splice_sendpage+0x3c/0x50 [ 443.604183][T27522] ? splice_from_pipe+0x170/0x170 [ 443.609190][T27522] do_splice+0x708/0x1410 [ 443.613502][T27522] ? opipe_prep.part.0+0x2e0/0x2e0 [ 443.618603][T27522] ? __fget_light+0x1a9/0x230 [ 443.623279][T27522] __x64_sys_splice+0x2c6/0x330 [ 443.628114][T27522] do_syscall_64+0xfa/0x760 [ 443.632619][T27522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.638490][T27522] RIP: 0033:0x459829 [ 443.642362][T27522] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 443.661967][T27522] RSP: 002b:00007f283866ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 443.670358][T27522] RAX: ffffffffffffffda RBX: 00007f283866ac90 RCX: 0000000000459829 [ 443.678331][T27522] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 09:58:19 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x8c', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 443.686281][T27522] RBP: 000000000075bfc8 R08: 00000000000002b1 R09: 0000000000000000 [ 443.694229][T27522] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f283866b6d4 [ 443.702187][T27522] R13: 00000000004c8fe8 R14: 00000000004df430 R15: 0000000000000007 09:58:19 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x18, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x3f000000}], 0x1, 0x0, 0x0) 09:58:19 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x19, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 443.923563][T27517] XFS (loop4): Invalid superblock magic number 09:58:19 executing program 2 (fault-call:10 fault-nth:5): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:58:19 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x1a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:19 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x03', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:19 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 444.260919][T27575] FAULT_INJECTION: forcing a failure. [ 444.260919][T27575] name failslab, interval 1, probability 0, space 0, times 0 [ 444.275626][T27575] CPU: 1 PID: 27575 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 444.284749][T27575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.294799][T27575] Call Trace: [ 444.298095][T27575] dump_stack+0x172/0x1f0 [ 444.302437][T27575] should_fail.cold+0xa/0x15 [ 444.307022][T27575] ? skb_clone+0x154/0x3d0 [ 444.311422][T27575] ? fault_create_debugfs_attr+0x180/0x180 [ 444.317227][T27575] ? page_to_nid.part.0+0x20/0x20 [ 444.322241][T27575] ? ___might_sleep+0x163/0x280 [ 444.327077][T27575] __should_failslab+0x121/0x190 [ 444.331998][T27575] should_failslab+0x9/0x14 [ 444.336551][T27575] kmem_cache_alloc_node_trace+0x274/0x750 [ 444.342344][T27575] ? kasan_unpoison_shadow+0x35/0x50 [ 444.347608][T27575] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 444.353436][T27575] __kmalloc_node_track_caller+0x3d/0x70 [ 444.359078][T27575] __kmalloc_reserve.isra.0+0x40/0xf0 [ 444.364441][T27575] __alloc_skb+0x10b/0x5e0 [ 444.368857][T27575] ? netdev_alloc_frag+0x1b0/0x1b0 [ 444.373950][T27575] ? lock_downgrade+0x920/0x920 [ 444.378779][T27575] ? __netlink_dump_start+0x10c/0x7d0 [ 444.384147][T27575] netlink_dump+0x71f/0xfa0 [ 444.388718][T27575] ? netlink_broadcast+0x50/0x50 [ 444.393656][T27575] __netlink_dump_start+0x5b1/0x7d0 [ 444.398840][T27575] packet_diag_handler_dump+0x212/0x2c0 [ 444.404364][T27575] ? pdiag_put_ring+0x310/0x310 [ 444.409192][T27575] ? sock_diag_rcv+0x1c/0x40 [ 444.413773][T27575] ? packet_diag_handler_dump+0x2c0/0x2c0 [ 444.423143][T27575] sock_diag_rcv_msg+0x319/0x410 [ 444.428065][T27575] netlink_rcv_skb+0x177/0x450 [ 444.432813][T27575] ? sock_diag_bind+0x80/0x80 [ 444.437489][T27575] ? netlink_ack+0xb30/0xb30 [ 444.442082][T27575] ? netlink_deliver_tap+0x254/0xbf0 [ 444.447376][T27575] sock_diag_rcv+0x2b/0x40 [ 444.451774][T27575] netlink_unicast+0x531/0x710 [ 444.456530][T27575] ? netlink_attachskb+0x7c0/0x7c0 [ 444.461629][T27575] ? _copy_from_iter_full+0x25d/0x8a0 [ 444.466980][T27575] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 444.472685][T27575] ? __check_object_size+0x3d/0x437 [ 444.477866][T27575] netlink_sendmsg+0x8a5/0xd60 [ 444.482611][T27575] ? netlink_unicast+0x710/0x710 [ 444.487526][T27575] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 444.493066][T27575] ? apparmor_socket_sendmsg+0x2a/0x30 [ 444.498521][T27575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.504754][T27575] ? security_socket_sendmsg+0x8d/0xc0 [ 444.510278][T27575] ? netlink_unicast+0x710/0x710 [ 444.515205][T27575] sock_sendmsg+0xd7/0x130 [ 444.519612][T27575] kernel_sendmsg+0x44/0x50 [ 444.524105][T27575] sock_no_sendpage+0x116/0x150 [ 444.528938][T27575] ? sock_kzfree_s+0x70/0x70 [ 444.533511][T27575] ? mark_held_locks+0xf0/0xf0 [ 444.538272][T27575] ? lock_acquire+0x190/0x410 [ 444.542939][T27575] ? pipe_lock+0x6e/0x80 [ 444.547161][T27575] kernel_sendpage+0x92/0xf0 [ 444.551738][T27575] ? sock_kzfree_s+0x70/0x70 [ 444.556321][T27575] sock_sendpage+0x8b/0xc0 [ 444.560754][T27575] pipe_to_sendpage+0x296/0x360 [ 444.565585][T27575] ? kernel_sendpage+0xf0/0xf0 [ 444.570344][T27575] ? direct_splice_actor+0x190/0x190 [ 444.575640][T27575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.581871][T27575] ? splice_from_pipe_next.part.0+0x262/0x300 [ 444.587919][T27575] __splice_from_pipe+0x397/0x7d0 [ 444.592938][T27575] ? direct_splice_actor+0x190/0x190 [ 444.598204][T27575] ? direct_splice_actor+0x190/0x190 [ 444.603464][T27575] splice_from_pipe+0x108/0x170 [ 444.608294][T27575] ? splice_shrink_spd+0xd0/0xd0 [ 444.613213][T27575] ? apparmor_file_permission+0x25/0x30 [ 444.618741][T27575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.624969][T27575] ? security_file_permission+0x8f/0x380 [ 444.630595][T27575] generic_splice_sendpage+0x3c/0x50 [ 444.635870][T27575] ? splice_from_pipe+0x170/0x170 [ 444.640885][T27575] do_splice+0x708/0x1410 [ 444.645225][T27575] ? opipe_prep.part.0+0x2e0/0x2e0 [ 444.650326][T27575] ? __fget_light+0x1a9/0x230 [ 444.654988][T27575] __x64_sys_splice+0x2c6/0x330 [ 444.659863][T27575] do_syscall_64+0xfa/0x760 [ 444.664352][T27575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.670220][T27575] RIP: 0033:0x459829 [ 444.674094][T27575] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.693685][T27575] RSP: 002b:00007f283866ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 444.702087][T27575] RAX: ffffffffffffffda RBX: 00007f283866ac90 RCX: 0000000000459829 [ 444.710034][T27575] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 444.717984][T27575] RBP: 000000000075bfc8 R08: 00000000000002b1 R09: 0000000000000000 [ 444.725934][T27575] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f283866b6d4 [ 444.733904][T27575] R13: 00000000004c8fe8 R14: 00000000004df430 R15: 0000000000000007 09:58:20 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:20 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x1b, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x40000000}], 0x1, 0x0, 0x0) 09:58:20 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x1c, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 444.925061][ C0] net_ratelimit: 14 callbacks suppressed [ 444.925069][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 444.925088][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 444.930799][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 444.936545][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 444.953702][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 444.959543][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 444.965315][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:20 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x1d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 445.038522][T27587] XFS (loop5): Invalid superblock magic number 09:58:20 executing program 2 (fault-call:10 fault-nth:6): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:58:20 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x1e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:20 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 445.143480][T27600] XFS (loop4): Invalid superblock magic number [ 445.279205][T27631] FAULT_INJECTION: forcing a failure. [ 445.279205][T27631] name failslab, interval 1, probability 0, space 0, times 0 [ 445.322462][T27631] CPU: 0 PID: 27631 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 445.331603][T27631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.341664][T27631] Call Trace: [ 445.344965][T27631] dump_stack+0x172/0x1f0 [ 445.349311][T27631] should_fail.cold+0xa/0x15 [ 445.353922][T27631] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 445.359479][T27631] ? fault_create_debugfs_attr+0x180/0x180 [ 445.365294][T27631] ? sk_filter_trim_cap+0x433/0xb30 [ 445.370497][T27631] ? __kasan_check_read+0x11/0x20 [ 445.375532][T27631] __should_failslab+0x121/0x190 [ 445.380476][T27631] should_failslab+0x9/0x14 [ 445.384979][T27631] kmem_cache_alloc+0x47/0x710 [ 445.389753][T27631] ? lock_acquire+0x190/0x410 [ 445.394447][T27631] ? netlink_deliver_tap+0x146/0xbf0 [ 445.399743][T27631] skb_clone+0x154/0x3d0 [ 445.403995][T27631] netlink_deliver_tap+0x94d/0xbf0 [ 445.409122][T27631] ? wait_for_completion+0x440/0x440 [ 445.414430][T27631] __netlink_sendskb+0x62/0xc0 [ 445.419202][T27631] netlink_dump+0x749/0xfa0 [ 445.423721][T27631] ? netlink_broadcast+0x50/0x50 [ 445.428671][T27631] __netlink_dump_start+0x5b1/0x7d0 [ 445.433886][T27631] packet_diag_handler_dump+0x212/0x2c0 [ 445.440945][T27631] ? pdiag_put_ring+0x310/0x310 [ 445.445800][T27631] ? sock_diag_rcv+0x1c/0x40 [ 445.450401][T27631] ? packet_diag_handler_dump+0x2c0/0x2c0 [ 445.456144][T27631] sock_diag_rcv_msg+0x319/0x410 [ 445.461101][T27631] netlink_rcv_skb+0x177/0x450 [ 445.465869][T27631] ? sock_diag_bind+0x80/0x80 [ 445.470556][T27631] ? netlink_ack+0xb30/0xb30 [ 445.475157][T27631] ? netlink_deliver_tap+0x254/0xbf0 [ 445.480454][T27631] sock_diag_rcv+0x2b/0x40 [ 445.484876][T27631] netlink_unicast+0x531/0x710 [ 445.489654][T27631] ? netlink_attachskb+0x7c0/0x7c0 [ 445.494773][T27631] ? _copy_from_iter_full+0x25d/0x8a0 [ 445.500154][T27631] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 445.505887][T27631] ? __check_object_size+0x3d/0x437 [ 445.511094][T27631] netlink_sendmsg+0x8a5/0xd60 [ 445.515859][T27631] ? netlink_unicast+0x710/0x710 [ 445.520799][T27631] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 445.526355][T27631] ? apparmor_socket_sendmsg+0x2a/0x30 [ 445.531799][T27631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.538041][T27631] ? security_socket_sendmsg+0x8d/0xc0 [ 445.543497][T27631] ? netlink_unicast+0x710/0x710 [ 445.549068][T27631] sock_sendmsg+0xd7/0x130 [ 445.553466][T27631] kernel_sendmsg+0x44/0x50 [ 445.557948][T27631] sock_no_sendpage+0x116/0x150 [ 445.562781][T27631] ? sock_kzfree_s+0x70/0x70 [ 445.567375][T27631] ? mark_held_locks+0xf0/0xf0 [ 445.572134][T27631] ? lock_acquire+0x190/0x410 [ 445.576821][T27631] ? pipe_lock+0x6e/0x80 [ 445.581054][T27631] kernel_sendpage+0x92/0xf0 [ 445.585647][T27631] ? sock_kzfree_s+0x70/0x70 [ 445.590225][T27631] sock_sendpage+0x8b/0xc0 [ 445.594634][T27631] pipe_to_sendpage+0x296/0x360 [ 445.599474][T27631] ? kernel_sendpage+0xf0/0xf0 [ 445.604303][T27631] ? direct_splice_actor+0x190/0x190 [ 445.609584][T27631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.615803][T27631] ? splice_from_pipe_next.part.0+0x262/0x300 [ 445.621848][T27631] __splice_from_pipe+0x397/0x7d0 [ 445.626849][T27631] ? direct_splice_actor+0x190/0x190 [ 445.632113][T27631] ? direct_splice_actor+0x190/0x190 [ 445.637391][T27631] splice_from_pipe+0x108/0x170 [ 445.642231][T27631] ? splice_shrink_spd+0xd0/0xd0 [ 445.647155][T27631] ? apparmor_file_permission+0x25/0x30 [ 445.652705][T27631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.658927][T27631] ? security_file_permission+0x8f/0x380 [ 445.664537][T27631] generic_splice_sendpage+0x3c/0x50 [ 445.669812][T27631] ? splice_from_pipe+0x170/0x170 [ 445.674831][T27631] do_splice+0x708/0x1410 [ 445.679158][T27631] ? opipe_prep.part.0+0x2e0/0x2e0 [ 445.684250][T27631] ? __fget_light+0x1a9/0x230 [ 445.688919][T27631] __x64_sys_splice+0x2c6/0x330 [ 445.693771][T27631] do_syscall_64+0xfa/0x760 [ 445.698255][T27631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.704123][T27631] RIP: 0033:0x459829 [ 445.708005][T27631] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.727692][T27631] RSP: 002b:00007f283866ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 445.736085][T27631] RAX: ffffffffffffffda RBX: 00007f283866ac90 RCX: 0000000000459829 [ 445.744036][T27631] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 445.752008][T27631] RBP: 000000000075bfc8 R08: 00000000000002b1 R09: 0000000000000000 [ 445.759962][T27631] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f283866b6d4 09:58:21 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x21, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 445.767915][T27631] R13: 00000000004c8fe8 R14: 00000000004df430 R15: 0000000000000007 09:58:21 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x22, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x8dffffff}], 0x1, 0x0, 0x0) [ 445.805073][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 445.810868][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 445.828116][T27633] XFS (loop1): Invalid superblock magic number 09:58:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:21 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfsB', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:21 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x23, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:21 executing program 2 (fault-call:10 fault-nth:7): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:58:21 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 446.104096][T27663] XFS (loop5): Invalid superblock magic number 09:58:21 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:21 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 446.280517][T27696] FAULT_INJECTION: forcing a failure. [ 446.280517][T27696] name failslab, interval 1, probability 0, space 0, times 0 [ 446.293192][T27696] CPU: 0 PID: 27696 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 446.302331][T27696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.312383][T27696] Call Trace: [ 446.315672][T27696] dump_stack+0x172/0x1f0 [ 446.319989][T27696] should_fail.cold+0xa/0x15 [ 446.324562][T27696] ? fault_create_debugfs_attr+0x180/0x180 [ 446.330352][T27696] __should_failslab+0x121/0x190 [ 446.335272][T27696] should_failslab+0x9/0x14 [ 446.339757][T27696] kmem_cache_alloc+0x47/0x710 [ 446.344514][T27696] ? lock_acquire+0x190/0x410 [ 446.349189][T27696] ? napi_disable+0xe0/0xe0 [ 446.353691][T27696] skb_clone+0x154/0x3d0 [ 446.357920][T27696] dev_queue_xmit_nit+0x342/0x990 [ 446.362937][T27696] ? validate_xmit_xfrm+0x43c/0xf10 [ 446.368130][T27696] ? netlink_sendmsg+0x8a5/0xd60 [ 446.373061][T27696] dev_hard_start_xmit+0xbb/0x9c0 [ 446.378089][T27696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.384311][T27696] __dev_queue_xmit+0x2b15/0x3650 [ 446.389334][T27696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.395572][T27696] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 446.400858][T27696] ? __copy_skb_header+0x270/0x550 [ 446.405967][T27696] ? __skb_checksum_complete+0x3f0/0x3f0 [ 446.411579][T27696] ? __kasan_check_write+0x14/0x20 [ 446.424080][T27696] ? __skb_clone+0x5c8/0x820 [ 446.428691][T27696] dev_queue_xmit+0x18/0x20 [ 446.433208][T27696] ? dev_queue_xmit+0x18/0x20 [ 446.437882][T27696] netlink_deliver_tap+0x8e2/0xbf0 [ 446.442980][T27696] ? wait_for_completion+0x440/0x440 [ 446.448249][T27696] __netlink_sendskb+0x62/0xc0 [ 446.452999][T27696] netlink_dump+0x749/0xfa0 [ 446.457501][T27696] ? netlink_broadcast+0x50/0x50 [ 446.462445][T27696] __netlink_dump_start+0x5b1/0x7d0 [ 446.467643][T27696] packet_diag_handler_dump+0x212/0x2c0 [ 446.473345][T27696] ? pdiag_put_ring+0x310/0x310 [ 446.478188][T27696] ? sock_diag_rcv+0x1c/0x40 [ 446.482791][T27696] ? packet_diag_handler_dump+0x2c0/0x2c0 [ 446.488510][T27696] sock_diag_rcv_msg+0x319/0x410 [ 446.493434][T27696] netlink_rcv_skb+0x177/0x450 [ 446.498181][T27696] ? sock_diag_bind+0x80/0x80 [ 446.502849][T27696] ? netlink_ack+0xb30/0xb30 [ 446.507443][T27696] ? netlink_deliver_tap+0x254/0xbf0 [ 446.512712][T27696] sock_diag_rcv+0x2b/0x40 [ 446.517114][T27696] netlink_unicast+0x531/0x710 [ 446.521900][T27696] ? netlink_attachskb+0x7c0/0x7c0 [ 446.527006][T27696] ? _copy_from_iter_full+0x25d/0x8a0 [ 446.532365][T27696] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 446.538065][T27696] ? __check_object_size+0x3d/0x437 [ 446.543266][T27696] netlink_sendmsg+0x8a5/0xd60 [ 446.548028][T27696] ? netlink_unicast+0x710/0x710 [ 446.552960][T27696] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 446.558517][T27696] ? apparmor_socket_sendmsg+0x2a/0x30 [ 446.564236][T27696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.570468][T27696] ? security_socket_sendmsg+0x8d/0xc0 [ 446.575907][T27696] ? netlink_unicast+0x710/0x710 [ 446.580835][T27696] sock_sendmsg+0xd7/0x130 [ 446.585246][T27696] kernel_sendmsg+0x44/0x50 [ 446.589740][T27696] sock_no_sendpage+0x116/0x150 [ 446.594774][T27696] ? sock_kzfree_s+0x70/0x70 [ 446.599367][T27696] ? mark_held_locks+0xf0/0xf0 [ 446.604127][T27696] ? lock_acquire+0x190/0x410 [ 446.608795][T27696] ? pipe_lock+0x6e/0x80 [ 446.613035][T27696] kernel_sendpage+0x92/0xf0 [ 446.617704][T27696] ? sock_kzfree_s+0x70/0x70 [ 446.622289][T27696] sock_sendpage+0x8b/0xc0 [ 446.626689][T27696] pipe_to_sendpage+0x296/0x360 [ 446.631529][T27696] ? kernel_sendpage+0xf0/0xf0 [ 446.636304][T27696] ? direct_splice_actor+0x190/0x190 [ 446.641583][T27696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.647829][T27696] ? splice_from_pipe_next.part.0+0x262/0x300 [ 446.653894][T27696] __splice_from_pipe+0x397/0x7d0 [ 446.658922][T27696] ? direct_splice_actor+0x190/0x190 [ 446.664205][T27696] ? direct_splice_actor+0x190/0x190 [ 446.669479][T27696] splice_from_pipe+0x108/0x170 [ 446.674318][T27696] ? splice_shrink_spd+0xd0/0xd0 [ 446.679244][T27696] ? apparmor_file_permission+0x25/0x30 [ 446.684858][T27696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.691080][T27696] ? security_file_permission+0x8f/0x380 [ 446.696701][T27696] generic_splice_sendpage+0x3c/0x50 [ 446.701998][T27696] ? splice_from_pipe+0x170/0x170 [ 446.707014][T27696] do_splice+0x708/0x1410 [ 446.711327][T27696] ? opipe_prep.part.0+0x2e0/0x2e0 [ 446.716427][T27696] ? __fget_light+0x1a9/0x230 [ 446.721102][T27696] __x64_sys_splice+0x2c6/0x330 [ 446.725949][T27696] do_syscall_64+0xfa/0x760 09:58:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0xeffdffff}], 0x1, 0x0, 0x0) [ 446.730525][T27696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.736412][T27696] RIP: 0033:0x459829 [ 446.740323][T27696] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.760475][T27696] RSP: 002b:00007f283866ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 446.768902][T27696] RAX: ffffffffffffffda RBX: 00007f283866ac90 RCX: 0000000000459829 [ 446.776896][T27696] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 446.776904][T27696] RBP: 000000000075bfc8 R08: 00000000000002b1 R09: 0000000000000000 [ 446.776911][T27696] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f283866b6d4 [ 446.776919][T27696] R13: 00000000004c8fe8 R14: 00000000004df430 R15: 0000000000000007 09:58:22 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:22 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:22 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:22 executing program 2 (fault-call:10 fault-nth:8): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 447.012848][T27702] XFS (loop1): Invalid superblock magic number 09:58:22 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 447.168126][T27728] XFS (loop4): Invalid superblock magic number [ 447.182350][T27750] FAULT_INJECTION: forcing a failure. [ 447.182350][T27750] name failslab, interval 1, probability 0, space 0, times 0 [ 447.195008][T27750] CPU: 1 PID: 27750 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 447.204124][T27750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.214177][T27750] Call Trace: [ 447.217479][T27750] dump_stack+0x172/0x1f0 [ 447.221818][T27750] should_fail.cold+0xa/0x15 [ 447.226412][T27750] ? fault_create_debugfs_attr+0x180/0x180 [ 447.226432][T27750] __should_failslab+0x121/0x190 [ 447.226447][T27750] should_failslab+0x9/0x14 [ 447.226458][T27750] kmem_cache_alloc+0x47/0x710 [ 447.226474][T27750] ? lock_acquire+0x190/0x410 [ 447.226495][T27750] ? napi_disable+0xe0/0xe0 [ 447.245072][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 447.246536][T27750] skb_clone+0x154/0x3d0 09:58:22 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 447.265618][T27750] dev_queue_xmit_nit+0x342/0x990 [ 447.270655][T27750] ? validate_xmit_xfrm+0x43c/0xf10 [ 447.275862][T27750] ? netlink_sendmsg+0x8a5/0xd60 [ 447.280813][T27750] dev_hard_start_xmit+0xbb/0x9c0 [ 447.285850][T27750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.292098][T27750] __dev_queue_xmit+0x2b15/0x3650 [ 447.297126][T27750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.303378][T27750] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 447.305825][T27739] XFS (loop5): Invalid superblock magic number 09:58:22 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x31, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 447.308672][T27750] ? __copy_skb_header+0x270/0x550 [ 447.308691][T27750] ? __skb_checksum_complete+0x3f0/0x3f0 [ 447.308712][T27750] ? __kasan_check_write+0x14/0x20 [ 447.308723][T27750] ? __skb_clone+0x5c8/0x820 [ 447.308744][T27750] dev_queue_xmit+0x18/0x20 [ 447.339785][T27750] ? dev_queue_xmit+0x18/0x20 [ 447.344474][T27750] netlink_deliver_tap+0x8e2/0xbf0 [ 447.349588][T27750] ? wait_for_completion+0x440/0x440 [ 447.354879][T27750] __netlink_sendskb+0x62/0xc0 [ 447.359669][T27750] netlink_dump+0x749/0xfa0 [ 447.364186][T27750] ? netlink_broadcast+0x50/0x50 [ 447.369130][T27750] __netlink_dump_start+0x5b1/0x7d0 [ 447.369151][T27750] packet_diag_handler_dump+0x212/0x2c0 [ 447.369174][T27750] ? pdiag_put_ring+0x310/0x310 [ 447.384728][T27750] ? sock_diag_rcv+0x1c/0x40 [ 447.384747][T27750] ? packet_diag_handler_dump+0x2c0/0x2c0 [ 447.384768][T27750] sock_diag_rcv_msg+0x319/0x410 [ 447.384787][T27750] netlink_rcv_skb+0x177/0x450 [ 447.384800][T27750] ? sock_diag_bind+0x80/0x80 [ 447.384820][T27750] ? netlink_ack+0xb30/0xb30 [ 447.414048][T27750] ? netlink_deliver_tap+0x254/0xbf0 09:58:22 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x32, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 447.419346][T27750] sock_diag_rcv+0x2b/0x40 [ 447.423764][T27750] netlink_unicast+0x531/0x710 [ 447.428540][T27750] ? netlink_attachskb+0x7c0/0x7c0 [ 447.433659][T27750] ? _copy_from_iter_full+0x25d/0x8a0 [ 447.439577][T27750] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 447.445295][T27750] ? __check_object_size+0x3d/0x437 [ 447.450502][T27750] netlink_sendmsg+0x8a5/0xd60 [ 447.455275][T27750] ? netlink_unicast+0x710/0x710 [ 447.460212][T27750] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 447.465761][T27750] ? apparmor_socket_sendmsg+0x2a/0x30 [ 447.465778][T27750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.465799][T27750] ? security_socket_sendmsg+0x8d/0xc0 [ 447.477488][T27750] ? netlink_unicast+0x710/0x710 [ 447.477505][T27750] sock_sendmsg+0xd7/0x130 [ 447.477523][T27750] kernel_sendmsg+0x44/0x50 [ 447.477539][T27750] sock_no_sendpage+0x116/0x150 [ 447.477554][T27750] ? sock_kzfree_s+0x70/0x70 [ 447.477570][T27750] ? mark_held_locks+0xf0/0xf0 [ 447.477589][T27750] ? lock_acquire+0x190/0x410 [ 447.477610][T27750] ? pipe_lock+0x6e/0x80 [ 447.520080][T27750] kernel_sendpage+0x92/0xf0 [ 447.524678][T27750] ? sock_kzfree_s+0x70/0x70 [ 447.529276][T27750] sock_sendpage+0x8b/0xc0 [ 447.533697][T27750] pipe_to_sendpage+0x296/0x360 [ 447.538553][T27750] ? kernel_sendpage+0xf0/0xf0 [ 447.543324][T27750] ? direct_splice_actor+0x190/0x190 [ 447.550090][T27750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.556332][T27750] ? splice_from_pipe_next.part.0+0x262/0x300 [ 447.562413][T27750] __splice_from_pipe+0x397/0x7d0 [ 447.567465][T27750] ? direct_splice_actor+0x190/0x190 [ 447.567480][T27750] ? direct_splice_actor+0x190/0x190 [ 447.567492][T27750] splice_from_pipe+0x108/0x170 [ 447.567505][T27750] ? splice_shrink_spd+0xd0/0xd0 [ 447.567532][T27750] ? apparmor_file_permission+0x25/0x30 [ 447.593379][T27750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.599629][T27750] ? security_file_permission+0x8f/0x380 [ 447.605276][T27750] generic_splice_sendpage+0x3c/0x50 [ 447.610555][T27750] ? splice_from_pipe+0x170/0x170 [ 447.615560][T27750] do_splice+0x708/0x1410 [ 447.619898][T27750] ? opipe_prep.part.0+0x2e0/0x2e0 [ 447.625029][T27750] ? __fget_light+0x1a9/0x230 [ 447.629691][T27750] __x64_sys_splice+0x2c6/0x330 [ 447.635079][T27750] do_syscall_64+0xfa/0x760 [ 447.639572][T27750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.645441][T27750] RIP: 0033:0x459829 [ 447.649327][T27750] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 447.668926][T27750] RSP: 002b:00007f283866ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 447.668940][T27750] RAX: ffffffffffffffda RBX: 00007f283866ac90 RCX: 0000000000459829 [ 447.668947][T27750] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000004 [ 447.668954][T27750] RBP: 000000000075bfc8 R08: 00000000000002b1 R09: 0000000000000000 [ 447.668962][T27750] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f283866b6d4 [ 447.668979][T27750] R13: 00000000004c8fe8 R14: 00000000004df430 R15: 0000000000000007 09:58:23 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x33, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:23 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0xf0ffffff}], 0x1, 0x0, 0x0) 09:58:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x35, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:23 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:23 executing program 2 (fault-call:10 fault-nth:9): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) [ 447.997383][T27782] XFS (loop1): Invalid superblock magic number 09:58:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x36, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x37, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 448.222958][T27803] XFS (loop4): Invalid superblock magic number 09:58:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x38, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 448.343107][T27782] XFS (loop1): Invalid superblock magic number [ 448.378604][T27819] XFS (loop5): Invalid superblock magic number 09:58:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x39, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:23 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:23 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3b, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0xfffffdef}], 0x1, 0x0, 0x0) 09:58:24 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3c, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:24 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 448.862592][T27874] XFS (loop1): Invalid superblock magic number 09:58:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x0) 09:58:24 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x3e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:24 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x42, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:24 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x43, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 449.090521][T27891] XFS (loop4): Invalid superblock magic number [ 449.105267][T27899] XFS (loop5): Invalid superblock magic number 09:58:24 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x46, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:24 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x48, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:24 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 449.444803][T27891] XFS (loop4): Invalid superblock magic number 09:58:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0xffffff8d}], 0x1, 0x0, 0x0) 09:58:24 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x49, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 449.630081][T27960] XFS (loop1): Invalid superblock magic number [ 449.672570][T27950] XFS (loop5): Invalid superblock magic number 09:58:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 449.858840][T27983] XFS (loop4): Invalid superblock magic number 09:58:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0xf, 0x0) 09:58:25 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:25 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4b, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:25 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:25 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4c, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:25 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:25 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:25 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x4e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 450.391138][T28018] XFS (loop4): Invalid superblock magic number [ 450.403590][T28010] XFS (loop1): Invalid superblock magic number 09:58:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0xfffffff0}], 0x1, 0x0, 0x0) 09:58:25 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 450.450720][T28034] XFS (loop5): Invalid superblock magic number 09:58:25 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x4, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 450.720749][T28018] XFS (loop4): Invalid superblock magic number [ 450.808522][T28010] XFS (loop1): Invalid superblock magic number 09:58:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x58, 0x0) 09:58:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x5, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x500, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:26 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x4000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:26 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x40000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 451.165192][ C1] net_ratelimit: 12 callbacks suppressed [ 451.165199][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 451.165606][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 451.170919][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 451.176617][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 451.182363][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 451.199461][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 451.205260][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 451.211018][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:26 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x40000000000}], 0x1, 0x0, 0x0) 09:58:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x1000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 451.405083][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 451.410883][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 451.428160][T28109] XFS (loop4): Invalid superblock magic number [ 451.435124][T28117] XFS (loop5): Invalid superblock magic number [ 451.442401][T28112] XFS (loop1): Invalid superblock magic number 09:58:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x2000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:26 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x5000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2c0, 0x0) 09:58:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x40000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 451.940597][T28165] XFS (loop4): Invalid superblock magic number 09:58:27 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0xa4ffffff, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0xf5ffffff, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0xffffffa4, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x10000000000000}], 0x1, 0x0, 0x0) 09:58:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0xfffffff5, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:27 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x4000000000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 452.369906][T28200] XFS (loop1): Invalid superblock magic number 09:58:27 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 452.591057][T28237] XFS (loop4): Invalid superblock magic number 09:58:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0xec0, 0x0) 09:58:28 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x100000000000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 452.837192][T28261] XFS (loop5): Invalid superblock magic number 09:58:28 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:28 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x200000000000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:28 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x500000000000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:28 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x4000000000000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 453.053602][T28285] XFS (loop1): Invalid superblock magic number 09:58:28 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x100000000000000}], 0x1, 0x0, 0x0) 09:58:28 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0xa4ffffff00000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:28 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0xf5ffffff00000000, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:28 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 453.468908][T28285] XFS (loop1): Invalid superblock magic number 09:58:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x33fe0, 0x0) 09:58:28 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 453.631900][T28338] XFS (loop4): Invalid superblock magic number 09:58:29 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:29 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:29 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:29 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 453.979593][T28367] XFS (loop1): Invalid superblock magic number [ 454.003922][T28338] XFS (loop4): Invalid superblock magic number 09:58:29 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x700000000000000}], 0x1, 0x0, 0x0) 09:58:29 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:29 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 454.189653][T28397] XFS (loop5): Invalid superblock magic number 09:58:29 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 454.298298][T28367] XFS (loop1): Invalid superblock magic number [ 454.471185][T28428] XFS (loop4): Invalid superblock magic number 09:58:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0xfffffdef, 0x0) 09:58:29 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 454.521605][T28397] XFS (loop5): Invalid superblock magic number 09:58:29 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:29 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 454.770063][T28458] XFS (loop1): Invalid superblock magic number 09:58:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x1f00000000000000}], 0x1, 0x0, 0x0) 09:58:30 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 455.066889][T28478] XFS (loop5): Invalid superblock magic number 09:58:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 455.133206][T28458] XFS (loop1): Invalid superblock magic number 09:58:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 455.290148][T28512] XFS (loop4): Invalid superblock magic number 09:58:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x2) 09:58:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:30 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:30 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 455.745167][T28539] XFS (loop1): Invalid superblock magic number 09:58:31 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:31 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xf9', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x3f00000000000000}], 0x1, 0x0, 0x0) 09:58:31 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:31 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:31 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 456.158014][T28580] XFS (loop4): Invalid superblock magic number [ 456.215053][ C1] net_ratelimit: 21 callbacks suppressed [ 456.215061][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 456.226519][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:31 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:31 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x4) 09:58:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 456.578164][T28580] XFS (loop4): Invalid superblock magic number 09:58:32 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 456.711324][T28639] XFS (loop1): Invalid superblock magic number 09:58:32 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xe0, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x7f', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x4000000000000000}], 0x1, 0x0, 0x0) 09:58:32 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:32 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xffe0, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:32 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xffffffe0, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:32 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:32 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xffffffffffffffe0, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:32 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x2, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 457.353591][T28681] XFS (loop4): Invalid superblock magic number [ 457.405074][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 457.405105][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 457.411039][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 457.416883][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 457.428301][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 457.434122][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 457.440529][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xa) 09:58:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x8c', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:32 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:32 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x5, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 457.570121][T28704] XFS (loop1): Invalid superblock magic number 09:58:33 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x500, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 457.645098][ C0] protocol 88fb is buggy, dev hsr_slave_0 09:58:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x8dffffff00000000}], 0x1, 0x0, 0x0) [ 457.778379][T28681] XFS (loop4): Invalid superblock magic number [ 457.978693][T28704] XFS (loop1): Invalid superblock magic number 09:58:33 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:33 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xf6', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:33 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:33 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x40000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x1d', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 458.253674][T28777] XFS (loop4): Invalid superblock magic number 09:58:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xe) 09:58:33 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x1000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:33 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x2000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 458.478524][T28800] XFS (loop1): Invalid superblock magic number 09:58:33 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x5000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0xeffdffff00000000}], 0x1, 0x0, 0x0) 09:58:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:34 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x40000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:34 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:34 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0xa4ffffff, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 458.967054][T28839] XFS (loop5): Invalid superblock magic number 09:58:34 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0xf5ffffff, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 459.065743][T28861] XFS (loop4): Invalid superblock magic number [ 459.072482][T28857] XFS (loop1): Invalid superblock magic number 09:58:34 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0xffffffa4, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 459.273139][T28839] XFS (loop5): Invalid superblock magic number 09:58:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x60) 09:58:34 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0xfffffff5, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:34 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4000000000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:34 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 459.598528][T28919] XFS (loop4): Invalid superblock magic number 09:58:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0xf0ffffff00000000}], 0x1, 0x0, 0x0) 09:58:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x100000000000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:35 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x200000000000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 459.813906][T28933] XFS (loop5): Invalid superblock magic number 09:58:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x500000000000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 459.918268][T28946] XFS (loop1): Invalid superblock magic number 09:58:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x4000000000000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0xa4ffffff00000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xf0) 09:58:35 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0xf5ffffff00000000, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 460.331335][T28946] XFS (loop1): Invalid superblock magic number 09:58:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x2, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 460.439496][T28995] XFS (loop5): Invalid superblock magic number [ 460.477445][T29000] XFS (loop4): Invalid superblock magic number 09:58:35 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0xffffffff00000000}], 0x1, 0x0, 0x0) 09:58:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x4, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:35 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:35 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x5, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:36 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:36 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x500, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:36 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x4000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 460.896931][T29031] XFS (loop1): Invalid superblock magic number [ 461.005711][T29059] XFS (loop4): Invalid superblock magic number [ 461.232275][T29031] XFS (loop1): Invalid superblock magic number 09:58:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x259) 09:58:36 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x40000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 461.352289][T29059] XFS (loop4): Invalid superblock magic number 09:58:36 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x1000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:36 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x2000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 461.471865][T29096] XFS (loop5): Invalid superblock magic number 09:58:36 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 461.565114][ C0] net_ratelimit: 5 callbacks suppressed [ 461.565123][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 461.575054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 461.576610][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 461.582349][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 461.593806][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 461.599584][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 461.605398][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 461.611268][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:36 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x5000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:37 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x40000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 461.770770][T29124] XFS (loop1): Invalid superblock magic number [ 461.805102][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 461.810902][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:58:37 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0xa4ffffff, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 461.927993][T29145] XFS (loop4): Invalid superblock magic number 09:58:37 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0xf5ffffff, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xa00) 09:58:37 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0xffffffa4, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:37 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:37 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:37 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:37 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0xfffffff5, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 462.474644][T29178] XFS (loop5): Invalid superblock magic number 09:58:37 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x4000000000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 462.587384][T29191] XFS (loop1): Invalid superblock magic number 09:58:37 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x100000000000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x200000000000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 462.644706][T29211] XFS (loop4): Invalid superblock magic number 09:58:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x500000000000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x4000000000000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 462.820458][T29178] XFS (loop5): Invalid superblock magic number [ 462.879807][T29191] XFS (loop1): Invalid superblock magic number 09:58:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xafb) 09:58:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0xa4ffffff00000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:38 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 463.344425][T29273] XFS (loop5): Invalid superblock magic number 09:58:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:38 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0xf5ffffff00000000, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:38 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x300}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 463.543977][T29300] XFS (loop1): Invalid superblock magic number 09:58:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:39 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:39 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 463.749231][T29324] XFS (loop4): Invalid superblock magic number [ 464.098439][T29324] XFS (loop4): Invalid superblock magic number 09:58:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xe00) 09:58:39 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:39 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:39 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x500]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:39 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 464.298946][T29369] XFS (loop5): Invalid superblock magic number [ 464.316253][T29368] XFS (loop1): Invalid superblock magic number 09:58:39 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x40000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:39 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:39 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x1000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:39 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:40 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x5000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 464.733521][T29368] XFS (loop1): Invalid superblock magic number [ 464.894966][T29426] XFS (loop5): Invalid superblock magic number 09:58:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xec0) 09:58:40 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:40 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x40000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:40 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:40 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xa4ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:40 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) [ 465.230909][T29444] XFS (loop4): Invalid superblock magic number 09:58:40 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 465.278085][T29453] XFS (loop1): Invalid superblock magic number 09:58:40 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffffa4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:40 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:40 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xfffffff5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:40 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:40 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x100000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 465.680681][T29498] XFS (loop5): Invalid superblock magic number [ 465.688007][T29453] XFS (loop1): Invalid superblock magic number 09:58:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x3f00) 09:58:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x200000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:41 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:41 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x500000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:41 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:41 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 466.198888][T29532] XFS (loop4): Invalid superblock magic number 09:58:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xa4ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 466.391226][T29553] XFS (loop1): Invalid superblock magic number 09:58:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 466.482243][T29574] XFS (loop5): Invalid superblock magic number 09:58:41 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 466.605059][ C1] net_ratelimit: 23 callbacks suppressed [ 466.605068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 466.616509][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 466.723655][T29553] XFS (loop1): Invalid superblock magic number 09:58:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x4000) 09:58:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:42 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:42 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:42 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 467.286859][T29628] XFS (loop4): Invalid superblock magic number [ 467.301360][T29634] XFS (loop5): Invalid superblock magic number 09:58:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 467.338242][T29658] XFS (loop1): Invalid superblock magic number 09:58:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:42 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 467.805071][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 467.805077][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 467.805121][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 467.810889][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 467.828097][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 467.833817][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 467.839573][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 467.845304][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x5902) 09:58:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:43 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:43 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xa4ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:43 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 468.074010][T29709] XFS (loop5): Invalid superblock magic number 09:58:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffffa4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 468.293604][T29736] XFS (loop1): Invalid superblock magic number 09:58:43 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xf9', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:43 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x6000) 09:58:44 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xff', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:44 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:44 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:44 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) [ 468.990727][T29792] XFS (loop1): Invalid superblock magic number 09:58:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x7f', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 469.112335][T29795] XFS (loop5): Invalid superblock magic number 09:58:44 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:44 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:44 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x8c', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:44 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xa4ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 469.449806][T29792] XFS (loop1): Invalid superblock magic number 09:58:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xc00e) 09:58:45 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:45 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\xf6', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:45 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:45 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:45 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 470.094363][T29894] XFS (loop5): Invalid superblock magic number [ 470.104835][T29895] XFS (loop1): Invalid superblock magic number 09:58:45 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\\', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:45 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:45 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x05', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:45 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xf000) 09:58:46 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:46 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:46 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:46 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:46 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:46 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 471.054011][T29973] XFS (loop1): Invalid superblock magic number [ 471.076538][T29977] XFS (loop4): Invalid superblock magic number [ 471.083196][T29978] XFS (loop5): Invalid superblock magic number 09:58:46 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:46 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:46 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:46 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xa4ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xfb0a) 09:58:47 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:47 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:47 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:47 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:47 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:47 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xffffffa4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:47 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 472.063448][T30051] XFS (loop5): Invalid superblock magic number [ 472.063471][T30049] XFS (loop1): Invalid superblock magic number [ 472.081255][T30052] XFS (loop4): Invalid superblock magic number 09:58:47 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:47 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:47 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 472.205074][ C0] net_ratelimit: 14 callbacks suppressed [ 472.205081][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 472.216507][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:58:47 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 472.500044][T30049] XFS (loop1): Invalid superblock magic number [ 472.845074][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 472.850892][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x34000) 09:58:48 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:48 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:48 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:48 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:48 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:48 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xa4ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:48 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 473.073769][T30133] XFS (loop1): Invalid superblock magic number [ 473.082120][T30132] XFS (loop4): Invalid superblock magic number [ 473.082338][T30135] XFS (loop5): Invalid superblock magic number 09:58:48 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:48 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:48 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:48 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x400300) 09:58:49 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:49 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:49 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:49 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 474.033505][T30219] XFS (loop4): Invalid superblock magic number [ 474.045069][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 474.045085][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 474.050836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 474.056589][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 474.062338][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 474.069165][T30221] XFS (loop5): Invalid superblock magic number 09:58:49 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 474.073767][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:49 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 474.112822][T30232] XFS (loop1): Invalid superblock magic number 09:58:49 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:49 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:49 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 474.481189][T30232] XFS (loop1): Invalid superblock magic number 09:58:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xf0ffff) 09:58:50 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:50 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:50 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:50 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:50 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:50 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xffffffa4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:50 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 475.018310][T30300] XFS (loop5): Invalid superblock magic number [ 475.039198][T30309] XFS (loop1): Invalid superblock magic number [ 475.046304][T30306] XFS (loop4): Invalid superblock magic number 09:58:50 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:50 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:50 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:50 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 475.337877][T30300] XFS (loop5): Invalid superblock magic number 09:58:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x1000000) 09:58:51 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:51 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:51 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:51 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:51 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:51 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 475.924868][T30388] XFS (loop1): Invalid superblock magic number 09:58:51 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 475.971075][T30389] XFS (loop4): Invalid superblock magic number [ 475.977424][T30392] XFS (loop5): Invalid superblock magic number 09:58:51 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:51 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:51 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:51 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) [ 476.501018][T30454] XFS (loop1): Invalid superblock magic number 09:58:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x2000000) 09:58:52 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:52 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:52 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:52 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) [ 476.779570][T30454] XFS (loop1): Invalid superblock magic number 09:58:52 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 476.924285][T30486] XFS (loop5): Invalid superblock magic number [ 476.936227][T30480] XFS (loop4): Invalid superblock magic number 09:58:52 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:52 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:52 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:52 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:52 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:52 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 477.409206][T30526] XFS (loop1): Invalid superblock magic number 09:58:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x4000000) 09:58:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:53 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:53 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 477.889054][T30573] XFS (loop4): Invalid superblock magic number [ 477.915650][T30570] XFS (loop5): Invalid superblock magic number 09:58:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 478.070899][T30605] XFS (loop1): Invalid superblock magic number [ 478.205078][ C0] net_ratelimit: 15 callbacks suppressed [ 478.205092][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 478.215058][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 478.216539][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 478.222259][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 478.233765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 478.239549][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 478.245372][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 478.251132][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:58:53 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:53 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 478.445068][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 478.450934][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:58:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xa000000) 09:58:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:54 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x200000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) [ 478.662012][T30642] XFS (loop4): Invalid superblock magic number 09:58:54 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:54 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:54 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 478.838813][T30659] XFS (loop5): Invalid superblock magic number 09:58:54 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xa4ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:54 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 478.978570][T30679] XFS (loop1): Invalid superblock magic number 09:58:54 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 479.050971][T30642] XFS (loop4): Invalid superblock magic number 09:58:54 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 479.221822][T30659] XFS (loop5): Invalid superblock magic number 09:58:54 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 479.320938][T30679] XFS (loop1): Invalid superblock magic number [ 479.469677][T30738] XFS (loop4): Invalid superblock magic number 09:58:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0xe000000) 09:58:54 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:54 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:54 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:54 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:55 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 479.718669][T30760] XFS (loop5): Invalid superblock magic number 09:58:55 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:55 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 479.915721][T30773] XFS (loop1): Invalid superblock magic number 09:58:55 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:55 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) 09:58:55 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:55 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) [ 480.204565][T30809] XFS (loop4): Invalid superblock magic number [ 480.349656][T30773] XFS (loop1): Invalid superblock magic number [ 480.364503][T30823] XFS (loop5): Invalid superblock magic number 09:58:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454244065b05007311"], 0xa) close(r3) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x2b1, 0x3f000000) 09:58:55 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32], 0xfffffec6) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x20004580}], 0x1}, 0x0}], 0x1, 0x0, 0x0) 09:58:55 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:56 executing program 1: syz_mount_image$xfs(&(0x7f0000001380)='xfs\x00', &(0x7f00000013c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@inode32='inode32'}, {@swidth={'swidth'}}]}) 09:58:56 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:56 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:56 executing program 4: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@noattr2='noattr2'}, {@filestreams='filestreams'}]}) [ 480.808406][T30823] XFS (loop5): Invalid superblock magic number 09:58:56 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffa4]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 09:58:56 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 481.001383][T30873] XFS (loop1): Invalid superblock magic number 09:58:56 executing program 5: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='uquota,ikeep,pqnoenforce']) 09:58:56 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) [ 481.065056][T30886] XFS (loop4): Invalid superblock magic number [ 481.268870][T30908] XFS (loop5): Invalid superblock magic number [ 481.402042][T30925] WARNING: CPU: 0 PID: 30925 at fs/block_dev.c:1899 __blkdev_put+0x6ba/0x810 [ 481.414999][T30925] Kernel panic - not syncing: panic_on_warn set ... [ 481.421579][T30925] CPU: 0 PID: 30925 Comm: blkid Not tainted 5.3.0-rc3-next-20190809 #63 [ 481.429876][T30925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.439948][T30925] Call Trace: [ 481.443223][T30925] dump_stack+0x172/0x1f0 [ 481.447544][T30925] ? __blkdev_put+0x5d0/0x810 [ 481.452199][T30925] panic+0x2dc/0x755 [ 481.456070][T30925] ? add_taint.cold+0x16/0x16 [ 481.460725][T30925] ? __kasan_check_write+0x14/0x20 [ 481.465822][T30925] ? __warn.cold+0x5/0x4c [ 481.470122][T30925] ? __warn+0xe7/0x1e0 [ 481.474169][T30925] ? __blkdev_put+0x6ba/0x810 [ 481.478821][T30925] __warn.cold+0x20/0x4c [ 481.483039][T30925] ? __blkdev_put+0x6ba/0x810 [ 481.487694][T30925] report_bug+0x263/0x2b0 [ 481.492000][T30925] do_error_trap+0x11b/0x200 [ 481.496566][T30925] do_invalid_op+0x37/0x50 [ 481.500963][T30925] ? __blkdev_put+0x6ba/0x810 [ 481.505624][T30925] invalid_op+0x23/0x30 [ 481.509760][T30925] RIP: 0010:__blkdev_put+0x6ba/0x810 [ 481.515111][T30925] Code: 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 24 fd ff ff 48 8b bd 50 ff ff ff e8 90 5d e6 ff e9 13 fd ff ff e8 46 6f ab ff <0f> 0b e9 dc fa ff ff 48 89 cf e8 57 5d e6 ff e9 6a fa ff ff 48 8b [ 481.534716][T30925] RSP: 0018:ffff88805fb4fc90 EFLAGS: 00010293 [ 481.540765][T30925] RAX: ffff888062ba44c0 RBX: ffff8880a1cf31c0 RCX: ffffffff81c6a4c4 [ 481.549656][T30925] RDX: 0000000000000000 RSI: ffffffff81c6a9ea RDI: 0000000000000005 [ 481.557626][T30925] RBP: ffff88805fb4fd88 R08: ffff888062ba44c0 R09: ffffed101439e63c [ 481.565596][T30925] R10: ffff88805fb4fc80 R11: ffff8880a1cf31df R12: 0000000000000002 [ 481.573545][T30925] R13: dffffc0000000000 R14: ffff8880a1cf31d8 R15: ffff8880a1cf31d8 [ 481.581510][T30925] ? __blkdev_put+0x194/0x810 [ 481.586191][T30925] ? __blkdev_put+0x6ba/0x810 [ 481.590870][T30925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.597096][T30925] ? bd_set_size+0xb0/0xb0 [ 481.601494][T30925] ? wait_for_completion+0x440/0x440 [ 481.606763][T30925] blkdev_put+0x98/0x560 [ 481.610986][T30925] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 481.617205][T30925] blkdev_close+0x8b/0xb0 [ 481.621514][T30925] __fput+0x2ff/0x890 [ 481.625476][T30925] ? blkdev_put+0x560/0x560 [ 481.629958][T30925] ____fput+0x16/0x20 [ 481.633926][T30925] task_work_run+0x145/0x1c0 [ 481.638517][T30925] exit_to_usermode_loop+0x316/0x380 [ 481.643787][T30925] do_syscall_64+0x65f/0x760 [ 481.648358][T30925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.654224][T30925] RIP: 0033:0x7fb93f6682b0 [ 481.658620][T30925] Code: 40 75 0b 31 c0 48 83 c4 08 e9 0c ff ff ff 48 8d 3d c5 32 08 00 e8 c0 07 02 00 83 3d 45 a3 2b 00 00 75 10 b8 03 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 ce 8a 01 00 48 89 04 24 [ 481.678291][T30925] RSP: 002b:00007ffd8bedc7c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 481.686688][T30925] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fb93f6682b0 [ 481.694652][T30925] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 481.702623][T30925] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 481.710588][T30925] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000014a3030 [ 481.718540][T30925] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 481.727393][T30925] Kernel Offset: disabled [ 481.731735][T30925] Rebooting in 86400 seconds..