x00') readahead(r0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000042e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:15 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x9c00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000052e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000062e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2657.853972] XFS (loop1): Mounting V4 Filesystem [ 2657.892136] XFS (loop1): totally zeroed log [ 2657.935220] XFS (loop5): Mounting V4 Filesystem 05:16:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000072e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2657.960133] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2657.969648] XFS (loop5): totally zeroed log [ 2658.014768] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2658.057216] XFS (loop3): Mounting V4 Filesystem 05:16:15 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x9c01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000002f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2658.111892] XFS (loop3): totally zeroed log [ 2658.125024] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:16 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000080)=@ax25={{0x3, @rose}, [@netrom, @default, @rose, @default, @null, @remote, @default, @null]}, &(0x7f0000000100)=0x80, 0x80800) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000140)={{{@in=@empty, @in6=@dev}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xffffffffffffffca) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000012f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:16 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x9d00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2658.471149] net_ratelimit: 24 callbacks suppressed [ 2658.471155] protocol 88fb is buggy, dev hsr_slave_0 [ 2658.481695] protocol 88fb is buggy, dev hsr_slave_1 05:16:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000022f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2658.726578] XFS (loop5): Mounting V4 Filesystem 05:16:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000032f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2658.763324] XFS (loop3): Mounting V4 Filesystem [ 2658.793982] XFS (loop5): totally zeroed log [ 2658.817066] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2658.845446] XFS (loop3): totally zeroed log [ 2658.852878] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000042f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:16 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x1, 0x20200) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000140)={0x1, 0x0, 0x0, 0x4, {0x1, 0x100000000, 0x6, 0xfffffffffffffffb}}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_SET_FPEMU(0xa, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x9, 0x200101) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000240)=0x0) sched_setparam(r4, &(0x7f0000000280)) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f00000000c0)={{0x2, 0x401}, 0x30}, 0xfffffffffffffeea) r5 = getpgid(r4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r5, 0x4, &(0x7f00000001c0)=""/70) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000180)) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2658.933308] XFS (loop1): Mounting V4 Filesystem [ 2658.976756] XFS (loop1): totally zeroed log [ 2658.994934] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:16 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x9d01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000052f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:17 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000062f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:17 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000072f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2659.359775] protocol 88fb is buggy, dev hsr_slave_0 [ 2659.365823] protocol 88fb is buggy, dev hsr_slave_1 [ 2659.372933] protocol 88fb is buggy, dev hsr_slave_0 [ 2659.379015] protocol 88fb is buggy, dev hsr_slave_1 [ 2659.385595] protocol 88fb is buggy, dev hsr_slave_0 [ 2659.391457] protocol 88fb is buggy, dev hsr_slave_1 05:16:17 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x9e00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:17 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x8000000000000000, 0x0) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f00000009c0)=""/33) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000b00)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x300200}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x40, r3, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x1) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() r6 = getuid() syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x4, &(0x7f0000000700)=[{&(0x7f00000003c0)="26f83278d465529b43a6a586de0459ebbae0760ad86b942c135e042af450527998a7ca26e79fe47a93b813490d9114ee721e22636ebad44cbeaa41fa3229469b3cd7ec5ebbc3c92a0fc72c602a859b159d0cc747f565b3dfab2ad0ab3c6a13909929d33dd8bb40121ba92e4341a96bf5e7c76b7c3bf31c90506a2ae0681eeda6fe7fdff0b0a88698990a98f3c2314444fb6eb3f7741ec7a754c9fec313b72385ff1ed78cb901f43c48be06537fa35328bfa7ee7e946682ae446e51607bd4a561a161fb77e9b2491bd5501fdaba3a3c", 0xcf, 0x4}, {&(0x7f00000004c0)="a35f740b2e6868ae", 0x8, 0x71}, {&(0x7f0000000500)="47204e2cef10b15cd3de942f77673e7e94f0170eb7b220ad96abff78f3dcbb85b7eb07da1f25bc163a56b9c5a3d83b42696aaaf90898eec5976f5bb4d0f991929bd97e0d0a184cc832e934af6115ac6fee407142313cc22366d3a790695bc6377da88ae3cab6d21ce40801bf554a0a74ce3b7a98f5d227af44153a7ca423dc3ffaf2776d58d7c448a7f8eda08ab2a027ab45787588f99f0f9f9f2e41c2301d22742f14fd83aa9de1b62952d9179780cfaaad8d43bfb6126974c8d155100da28a91dccebd", 0xc4, 0xa}, {&(0x7f0000000600)="cfa3b8d0b7f7a67a28561edf9d118a89aaf62f6f24c935a16f2df33722413da08009ca5034cebbefc0e996b13c81e0dd5d23c0de30e1fc1541f7563dd2d214ffd6665a62dd58a028dbdd4dbea21406017bb1ccd2ca855301b4e8d295f354aa252196949fdbc9f28eb30bca3bc6ab5839afda563990af6043f93291018d7a173641a648ca08d087836669527ba228b2dd647317a717c4fa883c3b1b854ef84280446ae87a61f9e648bbdca243dc3b7a94bb9ca5b774e10176fa2b1269258b44550fb8085359f7a261a9293ee14ec314", 0xcf, 0x7}], 0x800400, &(0x7f0000000840)={[{@swidth={'swidth', 0x3d, 0x400}}, {@allocsize={'allocsize', 0x3d, [0x30, 0x7f]}}, {@prjquota='prjquota'}], [{@obj_role={'obj_role', 0x3d, 'em0vmnet1('}}, {@permit_directio='permit_directio'}, {@uid_eq={'uid', 0x3d, r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/snd/pcmC#D#c\x00'}}, {@subj_user={'subj_user', 0x3d, 'hash'}}, {@fsmagic={'fsmagic', 0x3d, 0x2000000}}, {@euid_gt={'euid>', r6}}, {@context={'context', 0x3d, 'root'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) r7 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x400, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xffffffff}}, {@max_read={'max_read', 0x3d, 0x100}}, {@blksize={'blksize'}}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/kvm\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@hash='hash'}]}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000300f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2659.674093] XFS (loop3): Mounting V4 Filesystem [ 2659.731710] XFS (loop3): totally zeroed log 05:16:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001300f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2659.753690] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2659.785009] XFS (loop1): Mounting V4 Filesystem [ 2659.830338] XFS (loop1): totally zeroed log [ 2659.842897] protocol 88fb is buggy, dev hsr_slave_0 [ 2659.849341] protocol 88fb is buggy, dev hsr_slave_1 [ 2659.881741] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2659.884020] XFS (loop5): Mounting V4 Filesystem 05:16:17 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x9e01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2659.963398] XFS (loop5): totally zeroed log 05:16:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002300f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2660.003430] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:17 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:17 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x450000, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x7fff, 0x280243) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003300f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:18 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:18 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x9f00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004300f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:18 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005300f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2660.765761] XFS (loop1): Mounting V4 Filesystem 05:16:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006300f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:18 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x9f01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2660.838169] XFS (loop1): totally zeroed log [ 2660.854787] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2660.913989] XFS (loop5): Mounting V4 Filesystem 05:16:18 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x80, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0xffffffffffffffff, 0xfffffffffffffff7}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2660.956667] XFS (loop3): Mounting V4 Filesystem [ 2660.968752] XFS (loop5): totally zeroed log [ 2660.987970] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:18 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007300f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2661.034554] XFS (loop3): totally zeroed log [ 2661.052218] QAT: Invalid ioctl [ 2661.069204] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2661.226517] QAT: Invalid ioctl 05:16:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000310f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:19 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa000, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0x0, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:19 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001310f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:19 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000040)={0x3, 0x6}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000080)={0x12717, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:19 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa001, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2661.644743] XFS (loop1): Mounting V4 Filesystem [ 2661.694407] XFS (loop1): totally zeroed log [ 2661.717079] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002310f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2661.856880] XFS (loop3): Mounting V4 Filesystem [ 2661.880869] XFS (loop5): Mounting V4 Filesystem [ 2661.902908] XFS (loop3): totally zeroed log 05:16:19 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x545fe, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2661.925538] XFS (loop5): totally zeroed log [ 2661.933636] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2661.943100] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:19 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa100, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000340)=ANY=[]) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000140)={r4, 0x0, 0x30}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x1}, &(0x7f0000000100)=0x8) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f0000000200)={0xf, @capture={0x1000, 0x1, {0x3ff, 0xff}, 0x3f, 0x5}}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) socketpair(0x9, 0xb, 0x1000, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) clone(0x2002002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = msgget$private(0x0, 0x0) msgsnd(r8, &(0x7f00000000c0)=ANY=[@ANYBLOB='0'], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r8, 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) ioctl$KVM_RUN(r7, 0xae80, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x90000915, 0x0) 05:16:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003310f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x80000400000003, 0x300) getsockopt$packet_buf(r1, 0x107, 0x13, &(0x7f0000651000)=""/240, &(0x7f0000ca5ffc)=0xf0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x100000040, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:19 executing program 5: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x64010000, &(0x7f0000c00000/0x400000)=nil}) 05:16:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004310f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(0x0) readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:20 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa101, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005310f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:20 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) semget$private(0x0, 0x0, 0x12) 05:16:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006310f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(0x0) readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007310f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2662.903740] XFS (loop3): Mounting V4 Filesystem [ 2663.011407] XFS (loop3): totally zeroed log [ 2663.052682] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:20 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa200, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000320f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) flistxattr(r0, &(0x7f0000000140)=""/248, 0xf8) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) accept4$rose(r2, &(0x7f00000000c0)=@full={0xb, @dev, @remote, 0x0, [@remote, @bcast, @remote, @default, @remote, @null]}, &(0x7f0000000100)=0x40, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2663.230490] XFS (loop5): Mounting V4 Filesystem 05:16:21 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001320f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2663.331793] XFS (loop5): totally zeroed log 05:16:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002320f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2663.394857] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:21 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x200, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x80000000, 0x31, 0xfffffffffffffffa, 0x30000000, @tick=0x2, {0x9, 0x7}, {0x10000, 0xfffffffffffffffa}, @control={0x81, 0x2, 0x53}}, {0x100000001, 0x5, 0x3, 0x0, @time={0x77359400}, {0x0, 0x4}, {0x2, 0x7}, @result={0xffffffffffffffff, 0x7}}, {0x3f, 0x0, 0x68, 0x1, @tick=0x4, {0x2, 0x3}, {0x2, 0x7}, @raw32={[0x0, 0x9, 0x2]}}], 0x90) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000180)) 05:16:21 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa201, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003320f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) chroot(0x0) readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2663.553290] net_ratelimit: 16 callbacks suppressed [ 2663.553297] protocol 88fb is buggy, dev hsr_slave_0 [ 2663.563360] protocol 88fb is buggy, dev hsr_slave_1 [ 2663.568454] protocol 88fb is buggy, dev hsr_slave_0 [ 2663.573546] protocol 88fb is buggy, dev hsr_slave_1 [ 2663.578646] protocol 88fb is buggy, dev hsr_slave_0 [ 2663.583735] protocol 88fb is buggy, dev hsr_slave_1 [ 2663.649204] XFS (loop1): Mounting V4 Filesystem 05:16:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004320f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2663.724183] XFS (loop1): totally zeroed log [ 2663.789926] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:21 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa300, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005320f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2663.859577] XFS (loop3): Mounting V4 Filesystem [ 2663.919684] XFS (loop3): totally zeroed log [ 2663.964527] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2664.038054] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.043919] protocol 88fb is buggy, dev hsr_slave_1 05:16:21 executing program 1: chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:21 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x6, &(0x7f00000000c0)) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x10003, 0x0, &(0x7f0000c00000/0x400000)=nil}) r4 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000100)) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x80, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) 05:16:21 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006320f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:22 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa301, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2664.198665] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.203754] protocol 88fb is buggy, dev hsr_slave_1 [ 2664.260064] XFS (loop5): Mounting V4 Filesystem [ 2664.318575] XFS (loop5): totally zeroed log 05:16:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007320f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2664.416084] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2664.468913] XFS (loop3): Mounting V4 Filesystem 05:16:22 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000330f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2664.501791] XFS (loop3): totally zeroed log [ 2664.516742] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2664.599877] XFS (loop1): Mounting V4 Filesystem [ 2664.670360] XFS (loop1): totally zeroed log 05:16:22 executing program 5: chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:22 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa400, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001330f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2664.723703] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002330f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:22 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa401, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:22 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003330f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2665.296846] XFS (loop5): Mounting V4 Filesystem 05:16:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004330f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2665.317117] XFS (loop5): totally zeroed log [ 2665.320101] XFS (loop3): Mounting V4 Filesystem [ 2665.330319] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2665.407860] XFS (loop3): totally zeroed log [ 2665.430263] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2665.443514] XFS (loop1): Mounting V4 Filesystem 05:16:23 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa500, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005330f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2665.496007] XFS (loop1): totally zeroed log [ 2665.513742] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:23 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101000, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000100)=""/74) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000000c0)=""/58) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x40}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000001c0)={r2, 0xffffffffffffff00}, &(0x7f0000000200)=0x8) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r3, 0x2}, &(0x7f0000000280)=0x8) 05:16:23 executing program 5: chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006330f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:23 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa501, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:23 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) syz_kvm_setup_cpu$x86(r2, r0, &(0x7f0000f03000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="43a15b00000000000000b92f030000b8ce000000ba000000000f30c482cd3dd966baa100b80f000000ef0f01cf2e66f0f71066410f6a3666ba6100ecc74424001c010000c744240200000000ff2c24b805000000b9ca6900000f01d9", 0x5c}], 0x1, 0x50, &(0x7f0000000200)=[@flags={0x3, 0x40}, @dstype3={0x7, 0xa}], 0x2) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f00000000c0)) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000100)={0x0, 0x1000, 0x1000, 0x3, 0x5}) [ 2665.975790] QAT: Invalid ioctl [ 2665.998220] QAT: Invalid ioctl [ 2666.002389] QAT: Invalid ioctl [ 2666.013501] QAT: Invalid ioctl [ 2666.022279] QAT: Invalid ioctl 05:16:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007330f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2666.060307] XFS (loop5): Mounting V4 Filesystem [ 2666.071252] QAT: Invalid ioctl [ 2666.118427] QAT: Invalid ioctl [ 2666.129373] XFS (loop5): totally zeroed log [ 2666.137346] QAT: Invalid ioctl [ 2666.154067] QAT: Invalid ioctl [ 2666.159238] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2666.164523] XFS (loop3): Mounting V4 Filesystem [ 2666.179144] QAT: Invalid ioctl [ 2666.193857] QAT: Invalid ioctl [ 2666.211836] XFS (loop3): totally zeroed log [ 2666.217444] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2666.240015] QAT: Invalid ioctl [ 2666.257769] QAT: Invalid ioctl 05:16:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000340f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:24 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa600, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2666.275634] QAT: Invalid ioctl [ 2666.289926] QAT: Invalid ioctl [ 2666.303949] QAT: Invalid ioctl [ 2666.307866] QAT: Invalid ioctl [ 2666.314036] QAT: Invalid ioctl [ 2666.320642] XFS (loop1): Mounting V4 Filesystem [ 2666.322721] QAT: Invalid ioctl [ 2666.328643] QAT: Invalid ioctl [ 2666.328651] QAT: Invalid ioctl [ 2666.328657] QAT: Invalid ioctl [ 2666.328664] QAT: Invalid ioctl [ 2666.328669] QAT: Invalid ioctl [ 2666.328675] QAT: Invalid ioctl [ 2666.328681] QAT: Invalid ioctl [ 2666.336769] QAT: Invalid ioctl [ 2666.356800] XFS (loop1): totally zeroed log [ 2666.364884] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001340f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2666.378444] QAT: Invalid ioctl [ 2666.389610] QAT: Invalid ioctl [ 2666.397566] QAT: Invalid ioctl [ 2666.400762] QAT: Invalid ioctl [ 2666.403946] QAT: Invalid ioctl [ 2666.437488] QAT: Invalid ioctl [ 2666.440684] QAT: Invalid ioctl [ 2666.440693] QAT: Invalid ioctl [ 2666.440701] QAT: Invalid ioctl [ 2666.440707] QAT: Invalid ioctl [ 2666.440715] QAT: Invalid ioctl [ 2666.440722] QAT: Invalid ioctl [ 2666.440729] QAT: Invalid ioctl [ 2666.440735] QAT: Invalid ioctl [ 2666.440741] QAT: Invalid ioctl [ 2666.440749] QAT: Invalid ioctl [ 2666.440755] QAT: Invalid ioctl [ 2666.440762] QAT: Invalid ioctl [ 2666.440768] QAT: Invalid ioctl [ 2666.440779] QAT: Invalid ioctl [ 2666.458096] QAT: Invalid ioctl [ 2666.558348] QAT: Invalid ioctl [ 2666.581393] QAT: Invalid ioctl 05:16:24 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa601, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002340f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:24 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:24 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:24 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt6_stats\x00') getsockopt$inet_int(r2, 0x0, 0x1b, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003340f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:24 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa700, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004340f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2667.145196] XFS (loop5): Mounting V4 Filesystem [ 2667.162851] XFS (loop1): Mounting V4 Filesystem 05:16:24 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x10800, 0x0) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f0000000200)={0x62, "5206ad0be0d55bf63e43e2590c6827af04db693a6506b3ad89aa831121d1b16f98e752c9629da2fcf8890352b8017009c1c6c2c4c1e76bda53669bb81d0153d1a83ffadd29495071175d1721448f25aad1e51d4970789c4c1d4d7ce27a01218b22874a7d6614f929fb7504367b1614fd5994bd52787d572c5a78d9d20d5e709b"}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x8, 0x2000) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f0000000180)={0x9, 0x5, 0x5, 0x0, 0x0, 0x6}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x3c, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x210800, 0x1b2) ioctl$ASHMEM_GET_NAME(r4, 0x81007702, &(0x7f00000000c0)=""/82) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x12001, 0x11000}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000300)={0x1, 0x20, 0x5, 'queue1\x00', 0x100000000}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2667.198191] XFS (loop5): totally zeroed log [ 2667.204705] XFS (loop1): totally zeroed log [ 2667.216687] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005340f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2667.262333] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2667.271533] XFS (loop3): Mounting V4 Filesystem 05:16:25 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) pkey_alloc(0x0, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000180)=[0x66, 0x1, 0x7, 0x9, 0xffffffffffff8001], 0x5, 0x3, 0x911, 0x8, 0x200, 0x7, {0x1000, 0x6, 0x0, 0x1, 0x1, 0x7, 0x100, 0x2, 0x0, 0x5, 0x200, 0x0, 0x80000001, 0x4, "2a409aa2d99035b83cee7f98c8431c3c720467a5dd2820599f048d116a341a04"}}) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x400, 0x800) getsockname$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x5, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2667.375608] XFS (loop3): totally zeroed log 05:16:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006340f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2667.424302] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:25 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:25 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007340f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:25 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa701, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:25 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000350f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2667.878727] XFS (loop5): Mounting V4 Filesystem [ 2667.928358] XFS (loop5): totally zeroed log [ 2667.947286] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:25 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa800, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2668.046166] XFS (loop3): Mounting V4 Filesystem [ 2668.071321] XFS (loop3): totally zeroed log 05:16:25 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x400, 0x100) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f00000000c0)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2668.093011] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001350f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2668.266902] XFS (loop1): Mounting V4 Filesystem [ 2668.342858] XFS (loop1): totally zeroed log 05:16:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002350f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2668.368997] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:26 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa801, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:26 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$P9_RLOPEN(r0, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0x20, 0x3, 0x4}, 0x8}}, 0x18) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003350f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2668.740323] XFS (loop5): Mounting V4 Filesystem [ 2668.772456] XFS (loop5): totally zeroed log [ 2668.782393] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:26 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x10200, 0x2, 0x6000, 0x2000, &(0x7f0000e2a000/0x2000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)) [ 2668.914805] XFS (loop3): Mounting V4 Filesystem 05:16:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004350f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2668.958178] net_ratelimit: 24 callbacks suppressed [ 2668.958184] protocol 88fb is buggy, dev hsr_slave_0 [ 2668.968227] protocol 88fb is buggy, dev hsr_slave_1 [ 2669.003168] XFS (loop3): totally zeroed log 05:16:26 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa900, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2669.029157] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005350f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2669.248765] XFS (loop1): Mounting V4 Filesystem 05:16:27 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xa901, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2669.315007] XFS (loop1): totally zeroed log [ 2669.367843] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:27 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000e22000/0x3000)=nil}) sysfs$3(0x3) 05:16:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006350f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2669.482123] XFS (loop5): Mounting V4 Filesystem [ 2669.564905] XFS (loop5): totally zeroed log [ 2669.607490] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007350f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2669.724421] XFS (loop3): Mounting V4 Filesystem 05:16:27 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xaa00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000360f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2669.827254] XFS (loop3): totally zeroed log [ 2669.834984] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2669.845550] protocol 88fb is buggy, dev hsr_slave_0 [ 2669.850672] protocol 88fb is buggy, dev hsr_slave_1 [ 2669.855846] protocol 88fb is buggy, dev hsr_slave_0 [ 2669.860920] protocol 88fb is buggy, dev hsr_slave_1 [ 2669.866091] protocol 88fb is buggy, dev hsr_slave_0 [ 2669.871185] protocol 88fb is buggy, dev hsr_slave_1 05:16:27 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x408001, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000100)={r3, 0xc}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001360f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:27 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xaa01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2670.220800] XFS (loop1): Mounting V4 Filesystem 05:16:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002360f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2670.270118] XFS (loop1): totally zeroed log [ 2670.284901] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2670.329555] protocol 88fb is buggy, dev hsr_slave_0 [ 2670.334656] protocol 88fb is buggy, dev hsr_slave_1 05:16:28 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0xfffffffffffffffc, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='sit0\x00') ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003360f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2670.483681] XFS (loop5): Mounting V4 Filesystem [ 2670.539129] XFS (loop5): totally zeroed log 05:16:28 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xab00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:28 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2670.570560] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) [ 2670.638361] XFS (loop3): Mounting V4 Filesystem [ 2670.662543] XFS (loop3): totally zeroed log 05:16:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004360f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2670.689573] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005360f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006360f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:28 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xab01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x501000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x127ff, 0x0, &(0x7f0000fb0000/0x1000)=nil}) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="00fb040102255dbae24c70e645620714d11da27e22c9a5eb12870749659e1919497bc0e720ead162c3b01038bda55703626c70b1915dff09cf7958d18ccb09a24bace112dc51248d1c6bda544220eaca8b587fb5745626856ef680d82145ef1f54985da50b5b904b662a1b53c62bbb3e3fbfcef1d4af2e1f53bd5440c56221d06a0555915c1adadd8fd50c32903c1cda16b3f36a1a0ed11221483e492dbf2285fde8b1650000010007143904b0ec85ea4fea4d2de47adf90b7ec87cde2cae186077abf8c7fff62a94d1ba5d77bc375fb3d301511e36eacbd02b6baaa510f40b0178ba9e001e164f4e4556c4de83e7e0dae1b1f52fa7d19e5cd2d3bffbf7c2cdd4911b1cc00e4e772ab0475e055d8063c124004d4c99d320b9bbc80cab7a8d627fec32a8772292baa30f77fd181fd3785f0fa504ea001beb1928c866671a8ed8450e7272796bd2dcc612eb6433cd09c0e894b76a1c4dd4e186af49f814f9d6aff0d3fcb004b167d271667a1b37095b1d5525d9116a27fc7562cb8d04a7f9f01b57d5a9c504a74520f484e4c67a30dd1b26f79f46fe395896f05a29742b50c7cb5ecc03b8e3abbceb4b03cbcd2be136ab16d56050abc0ac9257355083b5dc181f17e55da8e628627385c160fd29f3caa92fc3b326079651e511326e1f03f0cfcfb18df0db74e030c2eb8b6a5df48793f01e609a29b60196d8822617dbbbba611390058cb54b8c8d300000000000000"], 0x104, 0x3) [ 2671.128550] XFS (loop1): Mounting V4 Filesystem [ 2671.197891] XFS (loop1): totally zeroed log [ 2671.212534] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:28 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000080)='./file0\x00', r3, r4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2671.282508] XFS (loop5): Mounting V4 Filesystem 05:16:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007360f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2671.305466] XFS (loop5): totally zeroed log [ 2671.338390] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:29 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) sendmsg$nfc_llcp(r0, &(0x7f0000000780)={&(0x7f0000000080)={0x27, 0x1, 0x1, 0x7, 0x1000, 0x3, "4da78c41a0297daafaf328c25433f0526766c74c365cb1284e0ab123f82e466c3ce6c81fc73e637e39ee6261a22d5236ae5b9f73176fa8818ff4e3a18d3d55", 0x3c}, 0x60, &(0x7f00000006c0)=[{&(0x7f0000000100)="2211428663b68a16fc7b4282edccce2e4870481749b3c3fb1558989a10b211ec7e4ee1c68fea857ec84bf750352aeb61722521bc549e6b666182658e9a9a53136dc17c39dbf5fe5f54c052cafb7c3c1a14c8907a51d5", 0x56}, {&(0x7f0000000180)="de3412dfed8e2a7456d325ca7ac306f5d55de931285f43e383532d9198e8b73fbd13dc8392c7fadea05cf93fe2487dcb4c71727e64a5dca311701a479da7fd6a9c52d1b922236f05fb1635d5ac7f4203d237eb40a852c46a9cdf7521dd13db5b7335467eb6280a59bab90d96fa2f0258c9fe72e89014ac37ab5a36f37cd166c8719a5101ffc31703b671d677b3c341f085299164d6d4412abf23241ed18b89e902fa3fa804989fc782de37d0513dfd62ab4c61453c24af47611e3e827c9597ce4b7e4fb1a583740d91e9871830bc66967672052333138ea73af513ff", 0xdc}, {&(0x7f0000000280)="1384cbc107de00125f354fa82e7dca159615b0f94128ff3846c07b13d45e111f24b5dd2e565fc7e4864a25e7dec3f4566e92b0aa41f6828f36cc875fec7a513a4d17eb34173e5bbf027d078774ad7a983b1a6443bbd239017243b1b4c5949a1050c4c6f0781488731dd0c24450d4e6faac150a9772", 0x75}, {&(0x7f0000000300)="1b032ed4cb0f4026eaa9c78fae74028ba1f5689a0fc0b2dc4fb6a72aa37987899a52ad84d8ecaf14d217d8cd65f0e2c88b3b5079169abab6e84fab1c73ba866492e840a903ab6e472b7521c41276d1f72c30fd6aad8a275c28ee5fbd96f671911d46df1d981ef9ca3f02d5c90c40304c719b950e90e9e25de304a73078ffb0359806bf30f4541785855db4d6845c2275f04a67", 0x93}, {&(0x7f00000003c0)="66d3e92bf3734397d2e4b4ec73a4aaf97ffcfbd909d9f60f7e224a8847dfca5e740e9a6738cafb258d0f54ce616f9ba1be09af062dc15d53e301dd1792164971f91a854467205e03a0cee5243a5c25df13dc1ba1a9fede0fe5a7c2ef7d8caac3f4efd0a38fc16cb42e9c3cad4b141a4613c3d9e027ea850188bbeaef29f94f8e1535fc4793f8b80eb8e60ff423fa33f777f19a63932bbc6b736529f74bed66206a7b61438a56320bcc86d9fc5698", 0xae}, {&(0x7f0000000480)="24533b21643f972a8c5fa81e155583ee721a6360616c643b3b940ba61e47c06583cf5e35de74bf00cb4cd6537518c72051933d75be5a21ed68f7ccd2888b6150abcf7d55a8303b17b4eb09dc37e4b796080aafee18ac599e4c35146e8619d43850d5e36a9c77db369967932443f6e7f7e1a8473b4f151abec68468c6c95b5ff6435919b7e9707e999ba13d557a9f5808557f220c50f471", 0x97}, {&(0x7f0000000540)="d32a91217de70c9e50066fff5f16000434cd69d9f0f5aaf1cc9aea26de482c673e0252ebbce218a4aed2e5213499b4e6619529d70e9d8155898b69", 0x3b}, {&(0x7f0000000580)="be87714e1573a1c8634ce77caa3613cebb64167b97a7ae90b30cfea74efef66ce5a9daac10810130bb402734026bba7ee9569c41a76dfdb7433a5dd394c3852a468f8e7de92595a9d81be1f20ed66ff0dd31fda6b5dffa9db5397788d858fc489b1df95b2b62c7dbf3696b0bdbae3de979a34845e923451839fb7a9ac963b7a0a99c2cb2dfe252ffc27d2c73008e7d50ca", 0x91}, {&(0x7f0000000640)="1c104131603e35a10193e86d53df46b1bc61efb136e47d11478f46672f611a7757b23ebdda47014a2fe820b431a1616d49ceb6dd8eb234f891ac16e7d3d6a31b743f8750d03792c34906d144caed77d8786258edf183faa590f9a40192b4ae1dcdb15fca7d7fdc79cd0bae44ed8348d031cb96184d88834be8bdc5086fd6", 0x7e}], 0x9, 0x0, 0x0, 0x4000011}, 0x1) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f00000007c0)={0x1a0a, 0x0, 0x8, 0x1, 0x7}) 05:16:29 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xac00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000370f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2671.669516] XFS (loop3): Mounting V4 Filesystem 05:16:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001370f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2671.766304] XFS (loop3): totally zeroed log [ 2671.810720] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:29 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xac01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002370f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:29 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f00000000c0)={0x7, 0x7fffffff}) writev(r2, &(0x7f00000011c0)=[{&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000001100)="5e9a3b8de3791dc236a0b603e47afb3975aa2d5fbcd90320fd8be90d291cc886b7ff6d87bc409d9486801a5b24c580dbc88a1f6d8b44b5e09255ce05a5e117b4dba3eb80c3e0384eda0ca6d0fe711705a70a26b6f2946e0b6810dabd1ebf63111db1db696fda5f246740363ef2b20b18dc5e7d3d6f92b9bf44080e4ece07cf1eb75ab14a516174300961a8c4fd0f9539bc145ceca31a020eb01cc39b33ba4d8cb15102801d8db3d6808893e6ddf6832492ce5058ee75fa5d", 0xb8}], 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003370f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2672.136650] XFS (loop1): Mounting V4 Filesystem [ 2672.161464] XFS (loop1): totally zeroed log [ 2672.169478] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2672.178415] XFS (loop5): Mounting V4 Filesystem [ 2672.270022] XFS (loop5): totally zeroed log 05:16:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004370f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:30 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_free(r1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x4, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil}) [ 2672.359731] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:30 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xad00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2672.491011] XFS (loop3): Mounting V4 Filesystem [ 2672.534885] XFS (loop3): totally zeroed log [ 2672.568003] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005370f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0f35"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:16:30 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000080)=""/95) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006370f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:30 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xad01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2672.986182] XFS (loop1): Mounting V4 Filesystem [ 2673.034561] XFS (loop1): totally zeroed log 05:16:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007370f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2673.058920] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:30 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f0000d76000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000080)="2e6464640f320f072e26672e670f38000865d182060066b9890000000f320f20c06635000000200f22c0b827018ed80fc79a4e006766c7442400000000806766c7442402670000006766c744240600000000670f011c2464640fc7680b", 0x5d}], 0x1, 0x14, &(0x7f0000000140), 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:30 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xae00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000380f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001380f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2673.373445] XFS (loop3): Mounting V4 Filesystem [ 2673.469962] XFS (loop3): totally zeroed log [ 2673.484248] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002380f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:31 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:31 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xae01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003380f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2673.912185] XFS (loop1): Mounting V4 Filesystem 05:16:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004380f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2673.980101] XFS (loop1): totally zeroed log [ 2674.010331] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2674.040344] net_ratelimit: 16 callbacks suppressed [ 2674.040351] protocol 88fb is buggy, dev hsr_slave_0 [ 2674.050418] protocol 88fb is buggy, dev hsr_slave_1 [ 2674.055523] protocol 88fb is buggy, dev hsr_slave_0 [ 2674.060616] protocol 88fb is buggy, dev hsr_slave_1 [ 2674.065714] protocol 88fb is buggy, dev hsr_slave_0 [ 2674.070808] protocol 88fb is buggy, dev hsr_slave_1 05:16:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005380f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:31 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xaf00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2674.276939] XFS (loop3): Mounting V4 Filesystem 05:16:31 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x3) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x900, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0xfffffffffffffffc, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 2674.307946] XFS (loop5): Mounting V4 Filesystem 05:16:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006380f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2674.356479] XFS (loop5): totally zeroed log [ 2674.364705] XFS (loop3): totally zeroed log [ 2674.398846] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:32 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x230080, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000000c0)=""/17) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) socket$unix(0x1, 0x7, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2674.442667] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2674.524383] protocol 88fb is buggy, dev hsr_slave_0 [ 2674.529498] protocol 88fb is buggy, dev hsr_slave_1 [ 2674.685757] protocol 88fb is buggy, dev hsr_slave_0 [ 2674.690824] protocol 88fb is buggy, dev hsr_slave_1 05:16:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007380f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:32 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xaf01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x800, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000700)='/dev/mixer\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000740)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000800)=[@text32={0x20, &(0x7f0000000780)="66baf80cb8a02a8e83ef66bafc0cb8ec000000eff021be5200000066715966ba430066edc4c275be30c4e13a529cc90900000066ba6100ed6765f30fab3ab9800000c00f3235000800000f3066baf80cb8e100b38def66bafc0cec", 0x5b}], 0x1, 0x60, &(0x7f0000000840), 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x40800, 0x0) write$P9_RLINK(r4, &(0x7f00000006c0)={0x7, 0x47, 0x1}, 0x7) r5 = getpid() ptrace$getsig(0x4202, r5, 0x2, &(0x7f0000000640)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000540)={0x0, @in6={{0xa, 0x4e24, 0x6, @empty, 0x6}}, 0x2, 0x100000001, 0x159333f4, 0x8, 0x81}, &(0x7f0000000600)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000300)={r6, 0x5, 0x10, 0x4, 0x80000001}, &(0x7f0000000340)=0x18) sendmsg$key(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x2, 0x9, 0x144, 0x5, 0x30, 0x0, 0x70bd25, 0x25dfdbfc, [@sadb_spirange={0x2, 0x10, 0x4d5, 0x4d2}, @sadb_key={0x8, 0x9, 0x1c0, 0x0, "e9dd8c15a1170cf7a7134d1c257954774451b8287706b3141512863e67bbbf771ee91043eb99edac87363321a1512268d2bed5c266993517"}, @sadb_x_policy={0x8, 0x12, 0x1, 0x3, 0x0, 0x6e6bbb, 0xfffffffffffffffb, {0x6, 0x7c, 0x0, 0x7, 0x0, 0x3, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x24}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @sadb_key={0x16, 0x9, 0x540, 0x0, "f81e0eb09dc9721142b01093aa55f125962122513fb244f53287a47941c7a85f86710e921d17164ab59fd527a97760795025f5b69372abce70266a096230626af2f26972e1069cae4684ff169d726e52fa1dd414bed72c1853237e106757b5d913669642a8e3aa5c76c0e9a3eb0d5db4122460f283525a2ecd34de7493e86c89059f9c71d35f660b4fa2ccfc4d09e19a2dd3c732d82994bb08c52152135835c0d3c5f468688779ab"}, @sadb_x_nat_t_port={0x1, 0x17, 0x4e24}, @sadb_x_filter={0x5, 0x1a, @in6=@remote, @in6=@dev={0xfe, 0x80, [], 0x14}, 0x15, 0x0, 0x10}]}, 0x180}}, 0x40090) r8 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x65, 0x250001) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000002c0)={0x7f, 0xfffffffffffffffe, 0xdd5b, 0x100000000, r7}, &(0x7f0000000140)=0x3a7) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000200)={r9, 0x78, &(0x7f0000000180)=[@in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x15a}, @in6={0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}]}, &(0x7f0000000240)=0x10) 05:16:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000390f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2674.911186] XFS (loop1): Mounting V4 Filesystem [ 2674.987730] XFS (loop1): totally zeroed log [ 2675.011535] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:32 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb000, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001390f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:32 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000080)={0x1fd, 0x3, 0x10000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x200040) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000100)={0x9d, 0x9bd, 0x8000, 0x4}, 0x10) [ 2675.257633] XFS (loop5): Mounting V4 Filesystem 05:16:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002390f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2675.302279] XFS (loop5): totally zeroed log [ 2675.320238] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2675.365253] XFS (loop3): Mounting V4 Filesystem [ 2675.410115] XFS (loop3): totally zeroed log [ 2675.426707] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:33 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb001, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003390f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004390f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:33 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) munlockall() r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7d48, 0x50201) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000140)=r3, 0x4) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f0000000200)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, @bcast, @rose={'rose', 0x0}, 0x1, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000004c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000540)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r4, 0x2}}, 0x18) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000180), &(0x7f0000000280)=0x4) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000c00000/0x400000)=nil}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 05:16:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2675.858216] XFS (loop1): Mounting V4 Filesystem [ 2675.901758] XFS (loop1): totally zeroed log [ 2675.914841] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:33 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb100, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005390f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2676.113305] XFS (loop5): Mounting V4 Filesystem 05:16:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006390f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007390f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2676.168322] XFS (loop5): totally zeroed log [ 2676.185761] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:33 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = accept(0xffffffffffffff9c, &(0x7f0000001540)=@nl=@unspec, &(0x7f0000003600)=0x80) connect$unix(r2, &(0x7f0000003640)=@file={0x0, './file0\x00'}, 0x6e) [ 2676.236474] XFS (loop3): Mounting V4 Filesystem 05:16:33 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb101, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2676.318809] XFS (loop3): totally zeroed log [ 2676.365885] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000003a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000013a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:34 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb200, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:34 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000080)={0x101ff, 0x0, &(0x7f0000ccd000/0x4000)=nil}) [ 2676.758941] XFS (loop1): Mounting V4 Filesystem 05:16:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2676.810525] XFS (loop1): totally zeroed log [ 2676.846315] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000033a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:34 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb201, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2677.059922] XFS (loop3): Mounting V4 Filesystem 05:16:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:34 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x3, 0xfffffffffffffffd, 0x1000, &(0x7f0000c1e000/0x1000)=nil}) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x5, 0x41) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000140)={0x3, 0x7, 0x3, 0x8000, 0x0, 0x0, 0x8, 0x4, 0x6, 0x200000000000, 0x100000001, 0x26}) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2677.141755] XFS (loop5): Mounting V4 Filesystem [ 2677.157684] XFS (loop3): totally zeroed log [ 2677.171855] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000043a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2677.202526] XFS (loop5): totally zeroed log 05:16:34 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) mount$9p_xen(&(0x7f0000000080)='/dev/kvm\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x400, &(0x7f0000000140)={'trans=xen,', {[{@msize={'msize', 0x3d, 0x1}}, {@access_user='access=user'}, {@cache_mmap='cache=mmap'}], [{@appraise='appraise'}]}}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2677.268813] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:35 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb300, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000053a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000063a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2677.704516] XFS (loop1): Mounting V4 Filesystem 05:16:35 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dsp\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f00000006c0)='/dev/kvm\x00', 0x9) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2677.777254] XFS (loop1): totally zeroed log [ 2677.828252] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:35 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb301, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000073a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2677.963094] XFS (loop5): Mounting V4 Filesystem [ 2678.039479] XFS (loop3): Mounting V4 Filesystem [ 2678.056139] XFS (loop5): totally zeroed log 05:16:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000003b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2678.095578] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2678.124062] XFS (loop3): totally zeroed log [ 2678.132919] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:35 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb400, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000013b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x101ff, 0x2, 0x7000, 0x2000, &(0x7f0000cd4000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2678.567606] XFS (loop1): Mounting V4 Filesystem 05:16:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000033b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:36 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb401, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2678.622770] XFS (loop1): totally zeroed log 05:16:36 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18, 0x73, 0x2, {{0x0, 0x2, 0x2}, 0xa4d}}, 0x18) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000000c0)=0x3) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2678.688799] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000043b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2678.814750] XFS (loop5): Mounting V4 Filesystem [ 2678.904424] XFS (loop5): totally zeroed log 05:16:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000053b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:36 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb500, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2678.949014] XFS (loop3): Mounting V4 Filesystem [ 2678.961891] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2678.997998] XFS (loop3): totally zeroed log 05:16:36 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2679.034252] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000063b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2679.287349] XFS (loop1): Mounting V4 Filesystem 05:16:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000073b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2679.360724] XFS (loop1): totally zeroed log [ 2679.392028] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:37 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb501, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:37 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2679.445273] net_ratelimit: 24 callbacks suppressed [ 2679.445279] protocol 88fb is buggy, dev hsr_slave_0 [ 2679.455298] protocol 88fb is buggy, dev hsr_slave_1 05:16:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000003c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2679.579484] XFS (loop5): Mounting V4 Filesystem [ 2679.629540] XFS (loop5): totally zeroed log [ 2679.643933] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:37 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb600, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000013c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2679.896394] XFS (loop3): Mounting V4 Filesystem 05:16:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:37 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1001000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000000080)=[{{&(0x7f0000000800)=@nl=@unspec, 0x80, &(0x7f0000000d00), 0x0, &(0x7f0000000d80)=""/246, 0x16}}], 0xa, 0x0, 0x0) fstat(r3, &(0x7f00000000c0)) r4 = dup2(r3, r2) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) write$P9_RREADLINK(r4, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r6, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:37 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb601, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2680.014978] XFS (loop3): totally zeroed log [ 2680.054490] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2680.068307] XFS (loop1): Mounting V4 Filesystem [ 2680.107350] XFS (loop1): totally zeroed log 05:16:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000033c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2680.147832] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2680.332597] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.337660] protocol 88fb is buggy, dev hsr_slave_1 [ 2680.342871] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.347920] protocol 88fb is buggy, dev hsr_slave_1 [ 2680.353053] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.358107] protocol 88fb is buggy, dev hsr_slave_1 05:16:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000043c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:38 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x280002, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f00000000c0)={@remote, @loopback, 0x0, 0x5, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0xff, @multicast2, @broadcast]}, 0x24) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2680.425099] XFS (loop5): Mounting V4 Filesystem 05:16:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:38 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb700, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2680.473402] XFS (loop5): totally zeroed log [ 2680.522691] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000053c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000063c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:38 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000080)) [ 2680.816589] protocol 88fb is buggy, dev hsr_slave_0 [ 2680.821690] protocol 88fb is buggy, dev hsr_slave_1 05:16:38 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb701, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2680.904939] XFS (loop3): Mounting V4 Filesystem [ 2680.994542] XFS (loop1): Mounting V4 Filesystem [ 2681.008433] XFS (loop3): totally zeroed log [ 2681.016538] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2681.023026] XFS (loop1): totally zeroed log 05:16:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000073c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2681.051686] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000003d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2681.201833] XFS (loop5): Mounting V4 Filesystem [ 2681.248957] XFS (loop5): totally zeroed log [ 2681.259574] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:39 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x10007, 0x0, &(0x7f0000f61000/0x1000)=nil}) 05:16:39 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb800, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000013d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:39 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000033d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:39 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb801, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2681.889022] XFS (loop1): Mounting V4 Filesystem 05:16:39 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x4000000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2681.912380] XFS (loop3): Mounting V4 Filesystem 05:16:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000043d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2681.954134] XFS (loop1): totally zeroed log [ 2681.962372] XFS (loop3): totally zeroed log [ 2681.973869] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2681.990398] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:39 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb900, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2682.071518] XFS (loop5): Mounting V4 Filesystem [ 2682.110262] XFS (loop5): totally zeroed log [ 2682.119624] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000053d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:40 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r3 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x3f, 0x4000) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000300)=0x4, 0x4) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e22, @remote}, 0x186, 0x0, 0x0, 0x0, 0x8, &(0x7f00000000c0)='veth1_to_bridge\x00', 0xffffffff, 0x1, 0xfff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) ioctl$TUNSETGROUP(r1, 0x400454ce, r5) r6 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000000)={0x0, 0x4000000000000, 0x0, 0x1000, &(0x7f0000c74000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000063d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:40 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xb901, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000073d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:40 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x4002, 0x1) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f00000000c0)) [ 2682.785439] XFS (loop3): Mounting V4 Filesystem [ 2682.786175] XFS (loop1): Mounting V4 Filesystem 05:16:40 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xba00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2682.841536] XFS (loop3): totally zeroed log 05:16:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000003e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2682.889522] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2682.894810] XFS (loop1): totally zeroed log [ 2682.924942] XFS (loop5): Mounting V4 Filesystem [ 2682.942904] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2682.969370] XFS (loop5): totally zeroed log 05:16:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000013e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2682.996870] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:40 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xba01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:40 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x800, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='children\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000f46000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000100)="36d9ff0f01ca66b9800000c00f326635010000000f30ba2100ec0f20460f01df0f070fc76c00660f2e77bffd", 0x2c}], 0x1, 0x2c, &(0x7f0000000180)=[@cstype3={0x5, 0x5}], 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000033e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000043e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2683.611066] XFS (loop3): Mounting V4 Filesystem [ 2683.645510] XFS (loop3): totally zeroed log 05:16:41 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbb00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2683.666592] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:41 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x1ffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x173) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x22) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000300)={0xa, 0x4, 0xfa00, {r3}}, 0xc) [ 2683.756192] XFS (loop1): Mounting V4 Filesystem [ 2683.818491] XFS (loop1): totally zeroed log 05:16:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2683.852991] XFS (loop5): Mounting V4 Filesystem 05:16:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000053e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2683.881214] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2683.902284] XFS (loop5): totally zeroed log [ 2683.925280] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:41 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbb01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000063e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:41 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/dlm-control\x00', 0x98002, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000001200)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000300)={0x5, 0x10, 0xfa00, {&(0x7f0000000080), r2}}, 0x18) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) write$UHID_CREATE2(r0, &(0x7f0000002740)=ANY=[@ANYBLOB="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"], 0x1118) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000340)) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) epoll_create(0x100000000) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x400, 0x0) 05:16:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000073e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:41 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x185, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x287, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000140)={0x0, 0x118fff}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffee3) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) ioctl$KVM_NMI(r4, 0xae9a) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x401) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$TIOCCONS(r1, 0x541d) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000180)={0x4, 0x8, 0x5, 0x4, 0x400}) r7 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) ioctl$NBD_SET_FLAGS(r7, 0xab0a, 0x1000) ioctl$KVM_GET_DIRTY_LOG(r6, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r7, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved}) [ 2684.382132] XFS (loop3): Mounting V4 Filesystem 05:16:42 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbc00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000003f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2684.437346] XFS (loop3): totally zeroed log [ 2684.501807] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2684.527386] net_ratelimit: 16 callbacks suppressed [ 2684.527392] protocol 88fb is buggy, dev hsr_slave_0 [ 2684.537467] protocol 88fb is buggy, dev hsr_slave_1 [ 2684.542614] protocol 88fb is buggy, dev hsr_slave_0 [ 2684.547711] protocol 88fb is buggy, dev hsr_slave_1 [ 2684.552810] protocol 88fb is buggy, dev hsr_slave_0 [ 2684.557943] protocol 88fb is buggy, dev hsr_slave_1 05:16:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000013f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2684.789171] XFS (loop5): Mounting V4 Filesystem [ 2684.797486] XFS (loop1): Mounting V4 Filesystem 05:16:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:42 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbc01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2684.870035] XFS (loop5): totally zeroed log [ 2684.876242] XFS (loop1): totally zeroed log [ 2684.901771] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:42 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) sigaltstack(&(0x7f0000d71000/0x3000)=nil, &(0x7f0000000080)) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2684.913837] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2685.011420] protocol 88fb is buggy, dev hsr_slave_0 [ 2685.016550] protocol 88fb is buggy, dev hsr_slave_1 05:16:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000033f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2685.172781] protocol 88fb is buggy, dev hsr_slave_0 [ 2685.177873] protocol 88fb is buggy, dev hsr_slave_1 05:16:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:42 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:42 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbd00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000043f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:42 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3ff, 0x82501) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f00000000c0)={0x6, 0x5, 0x0, 0x1df8, 0x80, 0x80000001, 0xffffffff, 0x0, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000003780)={r1, 0x40}, 0x63) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) recvmsg(r0, &(0x7f0000003740)={&(0x7f0000000180), 0x80, &(0x7f0000003580)=[{&(0x7f0000000200)=""/40, 0x28}, {&(0x7f0000000240)=""/80, 0x50}, {&(0x7f00000002c0)=""/45, 0x2d}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f0000003300)=""/229, 0xe5}, {&(0x7f0000003400)}, {&(0x7f0000003440)=""/59, 0x3b}, {&(0x7f0000003480)=""/227, 0xe3}], 0xa, &(0x7f0000003640)=""/206, 0xce}, 0x0) [ 2685.445935] XFS (loop3): Mounting V4 Filesystem 05:16:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000053f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:43 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3f, &(0x7f0000000080)=0x4, 0x4) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) [ 2685.560853] XFS (loop3): totally zeroed log [ 2685.591867] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2685.651636] XFS (loop5): Mounting V4 Filesystem [ 2685.710617] XFS (loop5): totally zeroed log [ 2685.722654] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2685.795706] XFS (loop1): Mounting V4 Filesystem 05:16:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000063f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:43 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbd01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:43 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x14001, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x1, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000440)={0x0, 0x1ff}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000340)={0x100, 0x101, 0x80000001, 'queue1\x00', 0x28}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x80000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x7, 0x101000) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) getpeername$tipc(r0, &(0x7f0000000480)=@name, &(0x7f00000004c0)=0x10) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) sigaltstack(&(0x7f0000c0f000/0x3000)=nil, &(0x7f0000000400)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x8000, 0x3, 0xa91e, 0x1, 0xbe, 0x54c, 0x1, {0x0, @in6={{0xa, 0x4e21, 0x1f, @dev={0xfe, 0x80, [], 0xc}, 0xfff}}, 0x8d, 0x0, 0x79da, 0x4, 0x7bad}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000001c0)={r4, 0x3, 0x1, 0x246}, &(0x7f0000000200)=0x10) [ 2685.850699] XFS (loop1): totally zeroed log [ 2685.880208] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r3, 0xfffffffffffffffa}) 05:16:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000073f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:43 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x801, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x12c, r3, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x32da}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe0}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x40}, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:43 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbe00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000400f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001400f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2686.385105] XFS (loop3): Mounting V4 Filesystem [ 2686.391594] XFS (loop5): Mounting V4 Filesystem 05:16:44 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) [ 2686.432864] XFS (loop3): totally zeroed log [ 2686.437729] XFS (loop5): totally zeroed log [ 2686.447295] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2686.487173] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2686.551123] XFS (loop1): Mounting V4 Filesystem [ 2686.567179] XFS (loop1): totally zeroed log [ 2686.581906] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r2, 0xfffffffffffffffa}) 05:16:44 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbe01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002400f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:44 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10440, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r2, 0xfffffffffffffffa}) 05:16:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r2, 0xfffffffffffffffa}) 05:16:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003400f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:44 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000140)=0x54) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,w6rkdir=./file1\\\x00']) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000240)='./file0\x00', 0x6c402, 0x0) sendfile(r2, r4, 0x0, 0x10000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) 05:16:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004400f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:44 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbf00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2687.167174] XFS (loop3): Mounting V4 Filesystem [ 2687.176487] overlayfs: unrecognized mount option "w6rkdir=./file1\" or missing value [ 2687.243686] XFS (loop3): totally zeroed log [ 2687.266528] audit: type=1800 audit(1548739004.809:2760): pid=24390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=17543 res=0 [ 2687.267383] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005400f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2687.327406] audit: type=1800 audit(1548739004.838:2761): pid=24390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor2" name="file0" dev="sda1" ino=17543 res=0 [ 2687.383261] XFS (loop1): Mounting V4 Filesystem 05:16:44 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xbf01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2687.425476] overlayfs: unrecognized mount option "w6rkdir=./file1\" or missing value [ 2687.444512] XFS (loop5): Mounting V4 Filesystem [ 2687.476818] XFS (loop1): totally zeroed log [ 2687.501554] XFS (loop5): totally zeroed log [ 2687.511142] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006400f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2687.533129] audit: type=1804 audit(1548739005.076:2762): pid=24426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir130059002/syzkaller.ButOrC/4505/file0/file0" dev="sda1" ino=17543 res=1 [ 2687.569663] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2687.595618] audit: type=1804 audit(1548739005.116:2763): pid=24390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor2" name="/root/syzkaller-testdir130059002/syzkaller.ButOrC/4505/file0/file0" dev="sda1" ino=17543 res=1 05:16:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r2, 0xfffffffffffffffa}) 05:16:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007400f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:45 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r2, 0xfffffffffffffffa}) 05:16:45 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @pic={0x2bd, 0x2, 0xb86f, 0x0, 0x90, 0x9, 0x7ff, 0x2, 0x7, 0x2, 0x39ea, 0x0, 0xff, 0xfffffffffffff800, 0x7ff, 0xb4ec}}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x2, 0x0) bind$x25(r2, &(0x7f0000000200)={0x9, @remote={[], 0x1}}, 0x12) 05:16:45 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc000, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000410f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2687.988329] XFS (loop3): Mounting V4 Filesystem [ 2688.083677] XFS (loop3): totally zeroed log [ 2688.100558] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001410f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2688.239878] XFS (loop1): Mounting V4 Filesystem 05:16:45 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc001, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2688.260247] XFS (loop1): totally zeroed log [ 2688.273920] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:45 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x1000, &(0x7f0000ed3000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) 05:16:45 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002410f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2688.488575] XFS (loop5): Mounting V4 Filesystem 05:16:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2688.594212] XFS (loop5): totally zeroed log 05:16:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003410f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2688.634200] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:46 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc100, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:46 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x404000, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000200)={r3, r0, 0x9}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r5, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r6 = dup(r4) ioctl$VIDIOC_QUERYBUF(r6, 0xc0585609, &(0x7f00000000c0)={0x9, 0x8, 0x4, 0x8e040, {}, {0x5, 0xf, 0x8, 0x0, 0x3, 0x400, "54c65fb3"}, 0xb024, 0x4, @userptr=0x4c287dfd, 0x4}) ioctl$BLKROSET(r6, 0x125d, &(0x7f0000000080)=0x1) 05:16:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004410f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2688.958656] XFS (loop3): Mounting V4 Filesystem [ 2688.991482] XFS (loop3): totally zeroed log [ 2689.002635] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005410f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:46 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc101, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2689.102853] XFS (loop1): Mounting V4 Filesystem 05:16:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006410f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2689.165111] XFS (loop1): totally zeroed log [ 2689.217931] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007410f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:46 executing program 2: ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x408000, 0x0) ioctl$TIOCCONS(r2, 0x541d) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) setsockopt$ax25_int(r3, 0x101, 0xf, &(0x7f00000000c0)=0x4, 0x4) [ 2689.503818] XFS (loop5): Mounting V4 Filesystem [ 2689.565684] XFS (loop5): totally zeroed log 05:16:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000420f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:47 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc200, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2689.605673] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2689.802299] XFS (loop3): Mounting V4 Filesystem 05:16:47 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001420f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:47 executing program 2: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000340)={"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"}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101200, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x20004000}, 0xc844) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x8200, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000780)=""/237) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) write$P9_RCREATE(r3, &(0x7f0000000740)={0x18, 0x73, 0x2, {{0x4, 0x0, 0x3}, 0x6573}}, 0x18) 05:16:47 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc201, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002420f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2689.926676] XFS (loop3): totally zeroed log [ 2689.932246] net_ratelimit: 24 callbacks suppressed [ 2689.932252] protocol 88fb is buggy, dev hsr_slave_0 [ 2689.942329] protocol 88fb is buggy, dev hsr_slave_1 [ 2689.964162] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003420f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) [ 2690.241808] XFS (loop1): Mounting V4 Filesystem 05:16:47 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc300, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2690.332730] XFS (loop5): Mounting V4 Filesystem [ 2690.342626] XFS (loop1): totally zeroed log [ 2690.365463] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2690.385442] XFS (loop5): totally zeroed log 05:16:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004420f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2690.409147] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2690.564770] XFS (loop3): Mounting V4 Filesystem 05:16:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:48 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x4a4700, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0xffffffff00000000, 0x400002) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={0x1, @null, @netrom={'nr', 0x0}, 0x0, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x900000000, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) readahead(r2, 0x4, 0xff) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000200)={0x2, 0x3, 0x0, 0x1000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r4, 0x4010ae42, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000c00000/0x400000)=nil}) r5 = semget$private(0x0, 0x0, 0x400) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f0000000100)=""/176) syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x17, 0x0) 05:16:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005420f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2690.681836] XFS (loop3): totally zeroed log [ 2690.717226] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000002c0)={0x0, 0xfffffffffffffffa}) 05:16:48 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc301, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006420f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2690.819935] protocol 88fb is buggy, dev hsr_slave_0 [ 2690.825868] protocol 88fb is buggy, dev hsr_slave_1 [ 2690.832796] protocol 88fb is buggy, dev hsr_slave_0 [ 2690.838518] protocol 88fb is buggy, dev hsr_slave_1 [ 2690.844992] protocol 88fb is buggy, dev hsr_slave_0 [ 2690.850952] protocol 88fb is buggy, dev hsr_slave_1 05:16:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000002c0)={0x0, 0xfffffffffffffffa}) 05:16:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007420f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2691.229314] XFS (loop1): Mounting V4 Filesystem 05:16:48 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc400, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2691.296389] XFS (loop1): totally zeroed log [ 2691.304557] protocol 88fb is buggy, dev hsr_slave_0 [ 2691.309748] protocol 88fb is buggy, dev hsr_slave_1 [ 2691.330238] XFS (loop5): Mounting V4 Filesystem [ 2691.339047] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000430f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2691.406500] XFS (loop5): totally zeroed log [ 2691.446402] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001430f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) 05:16:49 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc401, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2691.618861] XFS (loop3): Mounting V4 Filesystem [ 2691.632533] XFS (loop2): Mounting V4 Filesystem 05:16:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002430f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2691.694590] XFS (loop3): totally zeroed log [ 2691.703447] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2691.713600] XFS (loop2): totally zeroed log 05:16:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000002c0)={0x0, 0xfffffffffffffffa}) [ 2691.742682] XFS (loop2): Failed to read root inode 0x100000000080, error 22 05:16:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003430f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 05:16:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:49 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc500, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004430f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2692.089996] XFS (loop1): Mounting V4 Filesystem [ 2692.100063] XFS (loop1): totally zeroed log [ 2692.118597] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2692.283508] XFS (loop5): Mounting V4 Filesystem 05:16:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005430f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2692.371726] XFS (loop5): totally zeroed log [ 2692.401779] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(0xffffffffffffffff, 0x40106437, &(0x7f00000002c0)={r4, 0xfffffffffffffffa}) [ 2692.475718] XFS (loop2): Mounting V4 Filesystem 05:16:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006430f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:50 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc501, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2692.515886] XFS (loop2): totally zeroed log [ 2692.533103] XFS (loop2): Failed to read root inode 0x100000000080, error 22 05:16:50 executing program 5: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x6a01000000000000, 0x0, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2692.610772] XFS (loop3): Mounting V4 Filesystem [ 2692.649111] XFS (loop3): totally zeroed log [ 2692.662231] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007430f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000002c0)={0x0, 0xfffffffffffffffa}) 05:16:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 05:16:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000440f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:50 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc600, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000002c0)={0x0, 0xfffffffffffffffa}) [ 2692.993634] XFS (loop1): Mounting V4 Filesystem [ 2693.074043] XFS (loop1): totally zeroed log 05:16:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001440f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2693.097622] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:50 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc601, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002440f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2693.489559] XFS (loop2): Mounting V4 Filesystem 05:16:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003440f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2693.518315] XFS (loop3): Mounting V4 Filesystem [ 2693.546752] XFS (loop2): totally zeroed log [ 2693.575853] XFS (loop2): Failed to read root inode 0x100000000080, error 22 [ 2693.615325] XFS (loop5): Mounting V4 Filesystem 05:16:51 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc700, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2693.641188] XFS (loop3): totally zeroed log [ 2693.660003] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2693.669268] XFS (loop5): totally zeroed log [ 2693.682816] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:16:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004440f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 05:16:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005440f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:51 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r2 = getpgrp(0xffffffffffffffff) kcmp(r2, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_UNBIND(r3, 0x40106437, &(0x7f00000002c0)={0x0, 0xfffffffffffffffa}) 05:16:51 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc701, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2694.001000] XFS (loop1): Mounting V4 Filesystem [ 2694.076264] XFS (loop1): totally zeroed log [ 2694.090127] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006440f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007440f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:52 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc800, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2694.472272] XFS (loop5): Mounting V4 Filesystem [ 2694.481293] XFS (loop2): Mounting V4 Filesystem 05:16:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000450f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2694.515352] XFS (loop5): totally zeroed log [ 2694.525186] XFS (loop2): totally zeroed log [ 2694.540197] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2694.558478] XFS (loop2): Failed to read root inode 0x100000000080, error 22 [ 2694.626603] XFS (loop3): Mounting V4 Filesystem [ 2694.696146] XFS (loop3): totally zeroed log [ 2694.726098] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001450f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:52 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc801, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2694.896640] XFS (loop1): Mounting V4 Filesystem 05:16:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) [ 2694.987046] XFS (loop1): totally zeroed log [ 2695.014421] net_ratelimit: 16 callbacks suppressed [ 2695.014427] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.024417] protocol 88fb is buggy, dev hsr_slave_1 [ 2695.029554] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.034644] protocol 88fb is buggy, dev hsr_slave_1 [ 2695.039732] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.044834] protocol 88fb is buggy, dev hsr_slave_1 05:16:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002450f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2695.077142] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:52 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc900, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2695.293845] XFS (loop2): Mounting V4 Filesystem 05:16:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003450f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2695.394887] XFS (loop2): totally zeroed log 05:16:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) [ 2695.423849] XFS (loop2): Failed to read root inode 0x100000000080, error 22 05:16:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004450f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2695.499634] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.504880] protocol 88fb is buggy, dev hsr_slave_1 [ 2695.549615] XFS (loop5): Mounting V4 Filesystem [ 2695.580170] XFS (loop3): Mounting V4 Filesystem 05:16:53 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xc901, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2695.623094] XFS (loop5): totally zeroed log 05:16:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005450f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) [ 2695.653814] XFS (loop3): totally zeroed log [ 2695.660933] protocol 88fb is buggy, dev hsr_slave_0 [ 2695.666919] protocol 88fb is buggy, dev hsr_slave_1 [ 2695.667626] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2695.703955] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006450f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) [ 2696.034021] XFS (loop1): Mounting V4 Filesystem 05:16:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007450f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2696.070848] XFS (loop1): totally zeroed log [ 2696.096768] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:53 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xca00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2696.339393] XFS (loop2): Mounting V4 Filesystem 05:16:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000460f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2696.375480] XFS (loop2): totally zeroed log [ 2696.385117] XFS (loop2): Failed to read root inode 0x100000000080, error 22 05:16:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) [ 2696.421053] XFS (loop5): Mounting V4 Filesystem [ 2696.453404] XFS (loop5): totally zeroed log [ 2696.474105] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2696.474161] XFS (loop3): Mounting V4 Filesystem [ 2696.531047] XFS (loop3): totally zeroed log 05:16:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001460f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2696.556605] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:54 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xca01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002460f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:54 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) 05:16:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) [ 2696.933951] XFS (loop1): Mounting V4 Filesystem 05:16:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003460f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2697.056704] XFS (loop1): totally zeroed log 05:16:54 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xcb00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2697.101474] XFS (loop1): Failed to read root inode 0x100000000080, error 22 05:16:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004460f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2697.254712] XFS (loop5): Mounting V4 Filesystem [ 2697.290410] XFS (loop5): totally zeroed log [ 2697.310413] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2697.330315] XFS (loop2): Mounting V4 Filesystem 05:16:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005460f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2697.358333] XFS (loop3): Mounting V4 Filesystem 05:16:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000340)='nr0\x00') [ 2697.399937] XFS (loop2): totally zeroed log [ 2697.408417] XFS (loop3): totally zeroed log [ 2697.431872] XFS (loop2): Failed to read root inode 0x100000000080, error 22 [ 2697.439948] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:16:55 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xcb01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006460f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) 05:16:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000340)='nr0\x00') ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000480)) 05:16:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007460f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2698.040548] XFS (loop1): Mounting V4 Filesystem 05:16:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000470f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:55 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xcc00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2698.111334] XFS (loop5): Mounting V4 Filesystem [ 2698.119315] XFS (loop1): totally zeroed log [ 2698.147566] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2698.158160] XFS (loop5): totally zeroed log [ 2698.187905] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2698.216884] XFS (loop2): Mounting V4 Filesystem 05:16:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001470f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2698.271256] XFS (loop3): Mounting V4 Filesystem [ 2698.309018] XFS (loop2): totally zeroed log [ 2698.341932] XFS (loop3): totally zeroed log [ 2698.375094] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2698.377160] XFS (loop2): Failed to read root inode 0x100000000080, error 22 05:16:55 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) getpgrp(0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:55 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xcc01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000340)='nr0\x00') 05:16:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002470f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003470f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000340)='nr0\x00') ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000480)) socket(0xa, 0x3, 0x8) 05:16:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004470f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:16:56 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xcd00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2699.087651] XFS (loop5): Mounting V4 Filesystem 05:16:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005470f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2699.143181] XFS (loop5): totally zeroed log [ 2699.144715] XFS (loop1): Mounting V4 Filesystem [ 2699.161354] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2699.251391] XFS (loop1): totally zeroed log 05:16:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006470f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2699.279200] XFS (loop3): Mounting V4 Filesystem [ 2699.291877] XFS (loop1): Failed to read root inode 0x100000000080, error 22 [ 2699.338102] XFS (loop3): totally zeroed log 05:16:56 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xcd01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:56 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) r3 = getpgrp(0xffffffffffffffff) kcmp(r3, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8400ae8e, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_UNBIND(r4, 0x40106437, &(0x7f00000002c0)={r5, 0xfffffffffffffffa}) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000340)='nr0\x00') ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000480)) socket(0xa, 0x3, 0x8) 05:16:56 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007470f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2699.388456] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2699.424990] XFS (loop2): Mounting V4 Filesystem [ 2699.526999] XFS (loop2): totally zeroed log 05:16:57 executing program 1 (fault-call:2 fault-nth:0): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) [ 2699.556631] XFS (loop2): Failed to read root inode 0x100000000080, error 22 05:16:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000480f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2699.771463] FAULT_INJECTION: forcing a failure. [ 2699.771463] name failslab, interval 1, probability 0, space 0, times 0 05:16:57 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xce00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2699.887512] CPU: 0 PID: 25560 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2699.894720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2699.904065] Call Trace: [ 2699.906662] dump_stack+0x1db/0x2d0 [ 2699.910290] ? dump_stack_print_info.cold+0x20/0x20 [ 2699.915302] ? aa_file_perm+0x42e/0x1090 [ 2699.915353] should_fail.cold+0xa/0x15 [ 2699.915371] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2699.915393] ? ___might_sleep+0x1e7/0x310 [ 2699.915407] ? arch_local_save_flags+0x50/0x50 05:16:57 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:16:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001480f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2699.923329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2699.942618] __should_failslab+0x121/0x190 [ 2699.946859] should_failslab+0x9/0x14 [ 2699.950657] kmem_cache_alloc_trace+0x2d1/0x760 [ 2699.955332] alloc_pipe_info+0x152/0x580 [ 2699.959395] ? pipe_read+0x940/0x940 [ 2699.963107] ? aa_path_link+0x5d0/0x5d0 [ 2699.967101] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2699.972063] ? common_file_perm+0x231/0x800 [ 2699.976403] splice_direct_to_actor+0x795/0x9d0 [ 2699.981072] ? iterate_fd+0x4b0/0x4b0 [ 2699.984868] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2699.989707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2699.995236] ? do_splice_to+0x190/0x190 [ 2699.999203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2700.004737] ? rw_verify_area+0x118/0x360 [ 2700.008900] do_splice_direct+0x2c7/0x420 [ 2700.013067] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2700.017913] ? rcu_read_lock_sched_held+0x110/0x130 [ 2700.022929] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2700.027690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2700.033220] ? __sb_start_write+0x1ac/0x360 [ 2700.037556] do_sendfile+0x61a/0xe60 [ 2700.041272] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2700.045865] ? fput+0x128/0x1a0 [ 2700.049137] ? do_syscall_64+0x8c/0x800 [ 2700.053107] ? do_syscall_64+0x8c/0x800 [ 2700.057077] __x64_sys_sendfile64+0x1f8/0x240 [ 2700.061569] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2700.066157] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2700.070914] do_syscall_64+0x1a3/0x800 [ 2700.074795] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2700.079722] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2700.084734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2700.089576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2700.094766] RIP: 0033:0x458089 [ 2700.097976] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2700.116869] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2700.124564] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2700.131840] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2700.139130] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2700.146400] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2700.153655] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 [ 2700.217116] FAULT_INJECTION: forcing a failure. [ 2700.217116] name failslab, interval 1, probability 0, space 0, times 0 [ 2700.235440] CPU: 1 PID: 25579 Comm: syz-executor2 Not tainted 5.0.0-rc4+ #50 [ 2700.242627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2700.251965] Call Trace: [ 2700.254540] dump_stack+0x1db/0x2d0 [ 2700.258179] ? dump_stack_print_info.cold+0x20/0x20 [ 2700.263196] should_fail.cold+0xa/0x15 [ 2700.267078] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2700.272174] ? ___might_sleep+0x1e7/0x310 [ 2700.276337] ? arch_local_save_flags+0x50/0x50 [ 2700.280918] __should_failslab+0x121/0x190 [ 2700.285147] should_failslab+0x9/0x14 [ 2700.288938] __kmalloc+0x2dc/0x740 [ 2700.292468] ? strncpy_from_user+0x4e0/0x4e0 [ 2700.296866] ? fput+0x128/0x1a0 [ 2700.300132] ? do_syscall_64+0x8c/0x800 [ 2700.304093] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 2700.308936] __x64_sys_memfd_create+0x13c/0x4b0 [ 2700.313602] ? memfd_fcntl+0x1870/0x1870 [ 2700.317651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2700.322401] do_syscall_64+0x1a3/0x800 [ 2700.326298] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2700.331220] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2700.336228] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2700.341079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2700.346259] RIP: 0033:0x458089 [ 2700.349441] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2700.368334] RSP: 002b:00007f16d5d97a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2700.376029] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458089 [ 2700.383285] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004bd087 [ 2700.390540] RBP: 000000000073bf00 R08: 0000000020000098 R09: 00000000fbad8001 [ 2700.397797] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f16d5d986d4 [ 2700.405072] R13: 00000000004c69a2 R14: 00000000004dbdd0 R15: 0000000000000003 05:16:57 executing program 1 (fault-call:2 fault-nth:1): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) 05:16:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002480f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2700.419307] net_ratelimit: 24 callbacks suppressed [ 2700.419314] protocol 88fb is buggy, dev hsr_slave_0 [ 2700.429387] protocol 88fb is buggy, dev hsr_slave_1 [ 2700.458899] FAULT_INJECTION: forcing a failure. [ 2700.458899] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2700.470700] CPU: 0 PID: 25586 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2700.477883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2700.487225] Call Trace: [ 2700.489810] dump_stack+0x1db/0x2d0 [ 2700.493451] ? dump_stack_print_info.cold+0x20/0x20 [ 2700.498468] ? lock_downgrade+0x910/0x910 [ 2700.502609] ? kasan_check_read+0x11/0x20 [ 2700.506755] should_fail.cold+0xa/0x15 [ 2700.510633] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2700.515722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2700.521258] ? rcu_read_unlock+0x16/0x60 [ 2700.525306] ? find_held_lock+0x35/0x120 [ 2700.529356] ? rcu_read_unlock+0x16/0x60 [ 2700.533426] should_fail_alloc_page+0x50/0x60 [ 2700.537910] __alloc_pages_nodemask+0x323/0xdc0 [ 2700.542569] ? lock_downgrade+0x910/0x910 [ 2700.546707] ? kasan_check_read+0x11/0x20 [ 2700.550859] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2700.556135] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2700.561156] ? ___might_sleep+0x1e7/0x310 [ 2700.565295] ? trace_hardirqs_off+0xb8/0x310 [ 2700.569692] cache_grow_begin+0x9c/0x8c0 [ 2700.573757] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2700.579283] ? check_preemption_disabled+0x48/0x290 [ 2700.584292] kmem_cache_alloc_trace+0x67f/0x760 [ 2700.588958] alloc_pipe_info+0x152/0x580 [ 2700.593011] ? pipe_read+0x940/0x940 [ 2700.596709] ? aa_path_link+0x5d0/0x5d0 [ 2700.600675] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2700.605598] ? common_file_perm+0x231/0x800 [ 2700.609922] splice_direct_to_actor+0x795/0x9d0 [ 2700.614580] ? iterate_fd+0x4b0/0x4b0 [ 2700.618364] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2700.623204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2700.628725] ? do_splice_to+0x190/0x190 [ 2700.632688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2700.638214] ? rw_verify_area+0x118/0x360 [ 2700.642352] do_splice_direct+0x2c7/0x420 [ 2700.646505] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2700.651344] ? rcu_read_lock_sched_held+0x110/0x130 [ 2700.656354] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2700.661099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2700.666639] ? __sb_start_write+0x1ac/0x360 [ 2700.670970] do_sendfile+0x61a/0xe60 [ 2700.674699] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2700.679271] ? fput+0x128/0x1a0 [ 2700.682538] ? do_syscall_64+0x8c/0x800 [ 2700.686502] ? do_syscall_64+0x8c/0x800 [ 2700.690468] __x64_sys_sendfile64+0x1f8/0x240 [ 2700.694956] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2700.699525] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2700.704284] do_syscall_64+0x1a3/0x800 [ 2700.708174] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2700.713102] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2700.718119] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2700.722974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2700.728146] RIP: 0033:0x458089 [ 2700.731327] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2700.750216] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2700.758030] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2700.765286] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2700.772540] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2700.779794] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2700.787049] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 05:16:58 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:16:58 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000040)={{0xffffff94}}) 05:16:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:16:58 executing program 1 (fault-call:2 fault-nth:2): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) 05:16:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003480f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2700.927317] FAULT_INJECTION: forcing a failure. [ 2700.927317] name failslab, interval 1, probability 0, space 0, times 0 [ 2700.970064] CPU: 0 PID: 25601 Comm: syz-executor2 Not tainted 5.0.0-rc4+ #50 [ 2700.977258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2700.986603] Call Trace: [ 2700.989197] dump_stack+0x1db/0x2d0 [ 2700.992822] ? dump_stack_print_info.cold+0x20/0x20 [ 2700.997853] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2701.003128] ? print_usage_bug+0xd0/0xd0 [ 2701.007192] should_fail.cold+0xa/0x15 [ 2701.011077] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2701.011103] ? ___might_sleep+0x1e7/0x310 [ 2701.020331] ? arch_local_save_flags+0x50/0x50 [ 2701.024918] __should_failslab+0x121/0x190 [ 2701.024935] should_failslab+0x9/0x14 [ 2701.024948] kmem_cache_alloc+0x2be/0x710 [ 2701.024968] ? shmem_destroy_callback+0xc0/0xc0 [ 2701.024981] shmem_alloc_inode+0x1c/0x50 [ 2701.024997] alloc_inode+0x66/0x190 [ 2701.032999] new_inode_pseudo+0x71/0x1b0 [ 2701.033011] ? prune_icache_sb+0x1c0/0x1c0 [ 2701.033027] ? _raw_spin_unlock+0x2d/0x50 [ 2701.057717] new_inode+0x1f/0x40 [ 2701.065201] shmem_get_inode+0xe1/0x8d0 [ 2701.069176] ? shmem_encode_fh+0x340/0x340 [ 2701.073409] ? lock_downgrade+0x910/0x910 [ 2701.077548] ? lock_release+0xc40/0xc40 [ 2701.077560] ? __check_object_size+0xa3/0x790 [ 2701.077582] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2701.077599] shmem_file_setup+0x66/0x90 [ 2701.077613] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2701.077626] ? memfd_fcntl+0x1870/0x1870 [ 2701.077641] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2701.077663] do_syscall_64+0x1a3/0x800 [ 2701.090940] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2701.090956] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2701.090974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2701.126947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2701.132140] RIP: 0033:0x458089 [ 2701.135323] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2701.154217] RSP: 002b:00007f16d5d97a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2701.161912] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458089 05:16:58 executing program 5: connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty, 0x1}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@multicast2, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0xfffffffffffffffc, 0x5, 0x1000000000}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) [ 2701.169168] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004bd087 [ 2701.176428] RBP: 000000000073bf00 R08: 0000000020000098 R09: 00000000fbad8001 [ 2701.183683] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f16d5d986d4 [ 2701.190938] R13: 00000000004c69a2 R14: 00000000004dbdd0 R15: 0000000000000003 [ 2701.206930] FAULT_INJECTION: forcing a failure. [ 2701.206930] name failslab, interval 1, probability 0, space 0, times 0 05:16:58 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xce01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:16:58 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2701.218291] CPU: 0 PID: 25608 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2701.225472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2701.234810] Call Trace: [ 2701.237425] dump_stack+0x1db/0x2d0 [ 2701.241048] ? dump_stack_print_info.cold+0x20/0x20 [ 2701.246070] ? print_usage_bug+0xd0/0xd0 [ 2701.250145] should_fail.cold+0xa/0x15 [ 2701.254030] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2701.259134] ? ___might_sleep+0x1e7/0x310 [ 2701.263295] ? arch_local_save_flags+0x50/0x50 [ 2701.267886] ? mark_held_locks+0x100/0x100 [ 2701.272104] __should_failslab+0x121/0x190 [ 2701.276339] should_failslab+0x9/0x14 [ 2701.280157] kmem_cache_alloc_node_trace+0x270/0x720 [ 2701.285250] ? lock_downgrade+0x910/0x910 [ 2701.289379] ? kasan_check_read+0x11/0x20 [ 2701.293511] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2701.298790] __kmalloc_node+0x3d/0x70 [ 2701.302598] kvmalloc_node+0x68/0x100 [ 2701.306382] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 2701.306649] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.311294] ? aa_file_perm+0x42e/0x1090 [ 2701.311306] ? find_held_lock+0x35/0x120 [ 2701.311322] ? iov_iter_revert+0xaa0/0xaa0 [ 2701.316352] protocol 88fb is buggy, dev hsr_slave_1 [ 2701.320359] ? lock_downgrade+0x910/0x910 [ 2701.320371] ? kasan_check_read+0x11/0x20 [ 2701.320383] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2701.320396] ? rcu_read_unlock_special+0x380/0x380 [ 2701.324506] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.328652] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2701.328665] ? iov_iter_pipe+0xba/0x2f0 [ 2701.328682] default_file_splice_read+0x1b1/0xac0 [ 2701.333699] protocol 88fb is buggy, dev hsr_slave_1 [ 2701.337796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.337811] ? aa_path_link+0x5d0/0x5d0 [ 2701.337824] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2701.342025] protocol 88fb is buggy, dev hsr_slave_0 [ 2701.347222] ? iter_file_splice_write+0xfc0/0xfc0 [ 2701.347233] ? add_lock_to_list.isra.0+0x450/0x450 [ 2701.347246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.352289] protocol 88fb is buggy, dev hsr_slave_1 [ 2701.357260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.357276] ? check_preemption_disabled+0x48/0x290 [ 2701.357294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.431933] ? fsnotify+0x4f5/0xed0 [ 2701.435546] ? debug_mutex_init+0x2d/0x60 [ 2701.439683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.445204] ? __fsnotify_parent+0xe2/0x450 [ 2701.449536] ? fsnotify_first_mark+0x350/0x350 [ 2701.454117] ? apparmor_path_rmdir+0x30/0x30 [ 2701.458517] ? alloc_pipe_info+0x286/0x580 [ 2701.462759] ? security_file_permission+0x94/0x320 [ 2701.467684] ? rw_verify_area+0x118/0x360 [ 2701.471822] ? iter_file_splice_write+0xfc0/0xfc0 [ 2701.476650] do_splice_to+0x12a/0x190 [ 2701.480439] splice_direct_to_actor+0x31b/0x9d0 [ 2701.485100] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2701.490108] ? do_splice_to+0x190/0x190 [ 2701.494058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.499586] ? rw_verify_area+0x118/0x360 [ 2701.503719] do_splice_direct+0x2c7/0x420 [ 2701.507849] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2701.512672] ? rcu_read_lock_sched_held+0x110/0x130 [ 2701.517665] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2701.522396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.527909] ? __sb_start_write+0x1ac/0x360 [ 2701.532216] do_sendfile+0x61a/0xe60 [ 2701.535911] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2701.540502] ? fput+0x128/0x1a0 [ 2701.543771] ? do_syscall_64+0x8c/0x800 [ 2701.547724] ? do_syscall_64+0x8c/0x800 [ 2701.551676] __x64_sys_sendfile64+0x1f8/0x240 [ 2701.556148] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2701.560714] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2701.565457] do_syscall_64+0x1a3/0x800 [ 2701.569334] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2701.574249] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2701.579257] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2701.584101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2701.589271] RIP: 0033:0x458089 [ 2701.592463] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2701.611339] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 05:16:59 executing program 1 (fault-call:2 fault-nth:3): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) [ 2701.619021] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2701.626267] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2701.633510] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2701.640772] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2701.648028] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 [ 2701.720061] FAULT_INJECTION: forcing a failure. [ 2701.720061] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2701.731869] CPU: 0 PID: 25618 Comm: syz-executor2 Not tainted 5.0.0-rc4+ #50 [ 2701.739041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2701.748386] Call Trace: [ 2701.750971] dump_stack+0x1db/0x2d0 [ 2701.754600] ? dump_stack_print_info.cold+0x20/0x20 [ 2701.759610] ? lock_downgrade+0x910/0x910 [ 2701.763754] ? kasan_check_read+0x11/0x20 [ 2701.767911] should_fail.cold+0xa/0x15 [ 2701.771814] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2701.776921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2701.782463] ? rcu_read_unlock+0x16/0x60 [ 2701.786524] ? find_held_lock+0x35/0x120 [ 2701.790615] ? rcu_read_unlock+0x16/0x60 [ 2701.794684] should_fail_alloc_page+0x50/0x60 [ 2701.799174] __alloc_pages_nodemask+0x323/0xdc0 [ 2701.803841] ? lock_downgrade+0x910/0x910 [ 2701.807991] ? kasan_check_read+0x11/0x20 [ 2701.812130] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2701.817401] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2701.822431] ? ___might_sleep+0x1e7/0x310 [ 2701.826571] ? trace_hardirqs_off+0xb8/0x310 [ 2701.830970] cache_grow_begin+0x9c/0x8c0 [ 2701.835019] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2701.840546] ? check_preemption_disabled+0x48/0x290 [ 2701.845559] kmem_cache_alloc+0x645/0x710 [ 2701.849703] ? shmem_destroy_callback+0xc0/0xc0 [ 2701.854363] shmem_alloc_inode+0x1c/0x50 [ 2701.858416] alloc_inode+0x66/0x190 [ 2701.862048] new_inode_pseudo+0x71/0x1b0 [ 2701.866103] ? prune_icache_sb+0x1c0/0x1c0 [ 2701.870331] ? _raw_spin_unlock+0x2d/0x50 [ 2701.874501] new_inode+0x1f/0x40 [ 2701.877859] shmem_get_inode+0xe1/0x8d0 [ 2701.881825] ? shmem_encode_fh+0x340/0x340 [ 2701.886060] ? lock_downgrade+0x910/0x910 [ 2701.890197] ? lock_release+0xc40/0xc40 [ 2701.894175] ? __check_object_size+0xa3/0x790 [ 2701.898672] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2701.903511] shmem_file_setup+0x66/0x90 [ 2701.907479] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2701.912140] ? memfd_fcntl+0x1870/0x1870 [ 2701.916194] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2701.920945] do_syscall_64+0x1a3/0x800 [ 2701.924831] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2701.929754] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2701.934762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2701.939600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2701.944775] RIP: 0033:0x458089 [ 2701.947957] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2701.966848] RSP: 002b:00007f16d5d97a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2701.974544] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458089 [ 2701.981799] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004bd087 [ 2701.989053] RBP: 000000000073bf00 R08: 0000000020000098 R09: 00000000fbad8001 [ 2701.996317] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f16d5d986d4 [ 2702.003573] R13: 00000000004c69a2 R14: 00000000004dbdd0 R15: 0000000000000003 [ 2702.011013] protocol 88fb is buggy, dev hsr_slave_0 [ 2702.016105] protocol 88fb is buggy, dev hsr_slave_1 05:16:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004480f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2702.088499] FAULT_INJECTION: forcing a failure. [ 2702.088499] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2702.129562] CPU: 0 PID: 25627 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2702.136751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2702.146102] Call Trace: [ 2702.148698] dump_stack+0x1db/0x2d0 [ 2702.152339] ? dump_stack_print_info.cold+0x20/0x20 [ 2702.157350] ? kernel_text_address+0x73/0xf0 [ 2702.161760] should_fail.cold+0xa/0x15 [ 2702.165649] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2702.170755] ? arch_local_save_flags+0x50/0x50 [ 2702.175328] ? lock_release+0xc40/0xc40 05:16:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005480f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2702.179321] should_fail_alloc_page+0x50/0x60 [ 2702.183813] __alloc_pages_nodemask+0x323/0xdc0 [ 2702.188489] ? add_lock_to_list.isra.0+0x450/0x450 [ 2702.193422] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2702.198443] ? __kmalloc_node+0x3d/0x70 [ 2702.202422] ? rcu_read_lock_sched_held+0x110/0x130 [ 2702.207438] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2702.212986] alloc_pages_current+0x107/0x210 [ 2702.217401] push_pipe+0x3fc/0x7a0 [ 2702.220946] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 2702.225872] ? aa_file_perm+0x42e/0x1090 [ 2702.229927] ? find_held_lock+0x35/0x120 [ 2702.233990] ? iov_iter_revert+0xaa0/0xaa0 [ 2702.238250] ? lock_downgrade+0x910/0x910 [ 2702.242401] ? kasan_check_read+0x11/0x20 [ 2702.246550] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2702.251841] ? rcu_read_unlock_special+0x380/0x380 [ 2702.256771] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2702.261781] ? iov_iter_pipe+0xba/0x2f0 [ 2702.265761] default_file_splice_read+0x1b1/0xac0 [ 2702.270612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.276146] ? aa_path_link+0x5d0/0x5d0 [ 2702.280151] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2702.285425] ? iter_file_splice_write+0xfc0/0xfc0 [ 2702.290262] ? add_lock_to_list.isra.0+0x450/0x450 [ 2702.295219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.300761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.306312] ? check_preemption_disabled+0x48/0x290 [ 2702.311329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.316868] ? fsnotify+0x4f5/0xed0 [ 2702.320501] ? debug_mutex_init+0x2d/0x60 [ 2702.324647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 05:16:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006480f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2702.330181] ? __fsnotify_parent+0xe2/0x450 [ 2702.334501] ? fsnotify_first_mark+0x350/0x350 [ 2702.339081] ? apparmor_path_rmdir+0x30/0x30 [ 2702.343500] ? alloc_pipe_info+0x286/0x580 [ 2702.347738] ? security_file_permission+0x94/0x320 [ 2702.352929] ? rw_verify_area+0x118/0x360 [ 2702.357071] ? iter_file_splice_write+0xfc0/0xfc0 [ 2702.361943] do_splice_to+0x12a/0x190 [ 2702.365748] splice_direct_to_actor+0x31b/0x9d0 [ 2702.370413] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2702.375258] ? do_splice_to+0x190/0x190 [ 2702.379226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.384786] ? rw_verify_area+0x118/0x360 [ 2702.388935] do_splice_direct+0x2c7/0x420 [ 2702.393096] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2702.397971] ? rcu_read_lock_sched_held+0x110/0x130 [ 2702.403001] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2702.407749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2702.413277] ? __sb_start_write+0x1ac/0x360 [ 2702.417617] do_sendfile+0x61a/0xe60 [ 2702.421357] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2702.425950] ? fput+0x128/0x1a0 [ 2702.429228] ? do_syscall_64+0x8c/0x800 [ 2702.433196] ? do_syscall_64+0x8c/0x800 [ 2702.437174] __x64_sys_sendfile64+0x1f8/0x240 [ 2702.441666] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2702.446242] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2702.450998] do_syscall_64+0x1a3/0x800 [ 2702.454890] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2702.459815] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2702.464873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2702.469716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2702.474897] RIP: 0033:0x458089 [ 2702.478081] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2702.496992] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2702.504691] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2702.511950] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2702.519209] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 05:17:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2702.526467] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2702.533737] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 05:17:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007480f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:00 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:00 executing program 1 (fault-call:2 fault-nth:4): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) 05:17:00 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xcf00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x5, 0x81, 0x8, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000140), 0x0, 0x3}, 0x20) 05:17:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000490f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2702.796365] FAULT_INJECTION: forcing a failure. [ 2702.796365] name failslab, interval 1, probability 0, space 0, times 0 [ 2702.849886] XFS (loop2): SB sanity check failed [ 2702.860125] CPU: 1 PID: 25678 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2702.861843] XFS (loop2): Metadata corruption detected at xfs_sb_read_verify+0x4b1/0x600, xfs_sb block 0xffffffffffffffff [ 2702.867382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2702.867389] Call Trace: [ 2702.867407] dump_stack+0x1db/0x2d0 [ 2702.867427] ? dump_stack_print_info.cold+0x20/0x20 [ 2702.899015] ? print_usage_bug+0xd0/0xd0 [ 2702.903078] should_fail.cold+0xa/0x15 [ 2702.906979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2702.912089] ? ___might_sleep+0x1e7/0x310 [ 2702.916234] ? arch_local_save_flags+0x50/0x50 [ 2702.920819] ? mark_held_locks+0x100/0x100 [ 2702.925066] __should_failslab+0x121/0x190 [ 2702.929298] should_failslab+0x9/0x14 [ 2702.933093] kmem_cache_alloc_node_trace+0x270/0x720 [ 2702.933103] ? lock_downgrade+0x910/0x910 [ 2702.933115] ? kasan_check_read+0x11/0x20 [ 2702.933129] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2702.938257] XFS (loop2): Unmount and run xfs_repair [ 2702.942344] __kmalloc_node+0x3d/0x70 [ 2702.942361] kvmalloc_node+0x68/0x100 [ 2702.942381] iov_iter_get_pages_alloc+0x87f/0x15a0 [ 2702.946551] XFS (loop2): First 128 bytes of corrupted metadata buffer: [ 2702.951761] ? aa_file_perm+0x42e/0x1090 [ 2702.951774] ? find_held_lock+0x35/0x120 [ 2702.951790] ? iov_iter_revert+0xaa0/0xaa0 [ 2702.951805] ? lock_downgrade+0x910/0x910 [ 2702.960573] ? kasan_check_read+0x11/0x20 [ 2702.960587] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2702.960608] ? rcu_read_unlock_special+0x380/0x380 [ 2702.960624] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2702.964414] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 2702.969312] ? iov_iter_pipe+0xba/0x2f0 [ 2702.979991] default_file_splice_read+0x1b1/0xac0 [ 2703.003869] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2703.006660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.006675] ? aa_path_link+0x5d0/0x5d0 [ 2703.006689] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2703.019807] ? iter_file_splice_write+0xfc0/0xfc0 [ 2703.019817] ? add_lock_to_list.isra.0+0x450/0x450 [ 2703.019839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.023879] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2703.028613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.028628] ? check_preemption_disabled+0x48/0x290 [ 2703.028646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.042304] ? fsnotify+0x4f5/0xed0 [ 2703.042315] ? debug_mutex_init+0x2d/0x60 [ 2703.042330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.042343] ? __fsnotify_parent+0xe2/0x450 [ 2703.061247] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2703.061288] ? fsnotify_first_mark+0x350/0x350 [ 2703.121126] ? apparmor_path_rmdir+0x30/0x30 [ 2703.125528] ? alloc_pipe_info+0x286/0x580 [ 2703.129766] ? security_file_permission+0x94/0x320 [ 2703.134690] ? rw_verify_area+0x118/0x360 [ 2703.138845] ? iter_file_splice_write+0xfc0/0xfc0 [ 2703.143678] do_splice_to+0x12a/0x190 [ 2703.147474] splice_direct_to_actor+0x31b/0x9d0 [ 2703.152134] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2703.156973] ? do_splice_to+0x190/0x190 [ 2703.160933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.166460] ? rw_verify_area+0x118/0x360 [ 2703.170603] do_splice_direct+0x2c7/0x420 [ 2703.174743] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2703.179577] ? rcu_read_lock_sched_held+0x110/0x130 [ 2703.184584] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2703.189332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.194861] ? __sb_start_write+0x1ac/0x360 [ 2703.199173] do_sendfile+0x61a/0xe60 [ 2703.202886] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2703.207460] ? fput+0x128/0x1a0 [ 2703.210729] ? do_syscall_64+0x8c/0x800 [ 2703.214691] ? do_syscall_64+0x8c/0x800 [ 2703.218657] __x64_sys_sendfile64+0x1f8/0x240 [ 2703.223149] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2703.227720] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2703.232468] do_syscall_64+0x1a3/0x800 [ 2703.236348] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2703.241294] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2703.246316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2703.251154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2703.256340] RIP: 0033:0x458089 [ 2703.259519] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2703.278408] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2703.286132] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2703.293400] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 05:17:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) [ 2703.300680] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2703.307939] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2703.315210] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 [ 2703.322555] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2703.353697] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2703.363524] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 2703.373548] 00000070: 00 00 00 00 00 00 00 00 0c 09 00 00 00 00 00 00 ................ [ 2703.382080] XFS (loop2): SB validate failed with error -117. 05:17:00 executing program 5: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x1, r1, 0x1, 0x0, 0x6, @dev}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000d00), 0x4000000000001af, 0x0) 05:17:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001490f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:00 executing program 1 (fault-call:2 fault-nth:5): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) 05:17:00 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xcf01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:00 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002490f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:01 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) [ 2703.639649] FAULT_INJECTION: forcing a failure. [ 2703.639649] name fail_page_alloc, interval 1, probability 0, space 0, times 0 05:17:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003490f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2703.681934] CPU: 0 PID: 25725 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2703.689141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2703.698487] Call Trace: [ 2703.701071] dump_stack+0x1db/0x2d0 [ 2703.704701] ? dump_stack_print_info.cold+0x20/0x20 [ 2703.709722] ? kernel_text_address+0x73/0xf0 [ 2703.714135] should_fail.cold+0xa/0x15 [ 2703.718018] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2703.723134] ? arch_local_save_flags+0x50/0x50 [ 2703.727717] ? lock_release+0xc40/0xc40 [ 2703.727730] ? __lock_is_held+0xb6/0x140 [ 2703.735753] should_fail_alloc_page+0x50/0x60 [ 2703.735768] __alloc_pages_nodemask+0x323/0xdc0 [ 2703.735781] ? add_lock_to_list.isra.0+0x450/0x450 [ 2703.744910] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2703.744934] ? __kmalloc_node+0x3d/0x70 [ 2703.744950] ? rcu_read_lock_sched_held+0x110/0x130 [ 2703.754866] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2703.754888] alloc_pages_current+0x107/0x210 [ 2703.754906] push_pipe+0x3fc/0x7a0 [ 2703.777302] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 2703.782224] ? aa_file_perm+0x42e/0x1090 [ 2703.786275] ? find_held_lock+0x35/0x120 [ 2703.790334] ? iov_iter_revert+0xaa0/0xaa0 [ 2703.794566] ? lock_downgrade+0x910/0x910 [ 2703.798707] ? kasan_check_read+0x11/0x20 [ 2703.802852] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2703.808139] ? rcu_read_unlock_special+0x380/0x380 [ 2703.813071] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2703.818082] ? iov_iter_pipe+0xba/0x2f0 [ 2703.822057] default_file_splice_read+0x1b1/0xac0 [ 2703.826887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.832415] ? aa_path_link+0x5d0/0x5d0 [ 2703.836399] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2703.841689] ? iter_file_splice_write+0xfc0/0xfc0 [ 2703.846521] ? add_lock_to_list.isra.0+0x450/0x450 [ 2703.851438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.856965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.862494] ? check_preemption_disabled+0x48/0x290 [ 2703.867510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.873069] ? fsnotify+0x4f5/0xed0 [ 2703.876691] ? debug_mutex_init+0x2d/0x60 [ 2703.880838] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.886365] ? __fsnotify_parent+0xe2/0x450 [ 2703.890677] ? fsnotify_first_mark+0x350/0x350 [ 2703.895284] ? apparmor_path_rmdir+0x30/0x30 [ 2703.899686] ? alloc_pipe_info+0x286/0x580 [ 2703.903922] ? security_file_permission+0x94/0x320 [ 2703.908854] ? rw_verify_area+0x118/0x360 [ 2703.912993] ? iter_file_splice_write+0xfc0/0xfc0 [ 2703.917823] do_splice_to+0x12a/0x190 [ 2703.921628] splice_direct_to_actor+0x31b/0x9d0 [ 2703.926289] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2703.931127] ? do_splice_to+0x190/0x190 [ 2703.935086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.940620] ? rw_verify_area+0x118/0x360 [ 2703.944762] do_splice_direct+0x2c7/0x420 [ 2703.948904] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2703.953741] ? rcu_read_lock_sched_held+0x110/0x130 [ 2703.958744] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2703.963490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2703.969017] ? __sb_start_write+0x1ac/0x360 [ 2703.973334] do_sendfile+0x61a/0xe60 [ 2703.977049] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2703.981625] ? fput+0x128/0x1a0 [ 2703.984939] ? do_syscall_64+0x8c/0x800 [ 2703.988901] ? do_syscall_64+0x8c/0x800 [ 2703.992908] __x64_sys_sendfile64+0x1f8/0x240 [ 2703.997409] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2704.001999] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2704.006760] do_syscall_64+0x1a3/0x800 [ 2704.010647] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2704.015568] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2704.020591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2704.025433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2704.030607] RIP: 0033:0x458089 [ 2704.033789] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2704.052675] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2704.060424] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2704.067683] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2704.074937] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 05:17:01 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x0, 0x0, 0x0, @empty}}}}}, 0x0) [ 2704.082202] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2704.089460] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 05:17:01 executing program 1 (fault-call:2 fault-nth:6): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) 05:17:01 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd000, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004490f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2704.276113] FAULT_INJECTION: forcing a failure. [ 2704.276113] name fail_page_alloc, interval 1, probability 0, space 0, times 0 05:17:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r1, &(0x7f0000000100)=[{{}, 0x1, 0x52, 0x400000002}], 0xffd9) [ 2704.363560] CPU: 1 PID: 25754 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2704.370759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2704.380105] Call Trace: [ 2704.382689] dump_stack+0x1db/0x2d0 [ 2704.386327] ? dump_stack_print_info.cold+0x20/0x20 [ 2704.391335] ? kernel_text_address+0x73/0xf0 [ 2704.395746] should_fail.cold+0xa/0x15 [ 2704.399625] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2704.404739] ? arch_local_save_flags+0x50/0x50 [ 2704.409307] ? lock_release+0xc40/0xc40 [ 2704.413272] ? __lock_is_held+0xb6/0x140 [ 2704.417333] should_fail_alloc_page+0x50/0x60 [ 2704.421820] __alloc_pages_nodemask+0x323/0xdc0 [ 2704.426487] ? add_lock_to_list.isra.0+0x450/0x450 [ 2704.431410] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2704.436428] ? __kmalloc_node+0x3d/0x70 [ 2704.440396] ? rcu_read_lock_sched_held+0x110/0x130 [ 2704.445401] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2704.450951] alloc_pages_current+0x107/0x210 [ 2704.455357] push_pipe+0x3fc/0x7a0 [ 2704.458898] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 2704.463816] ? aa_file_perm+0x42e/0x1090 [ 2704.467873] ? find_held_lock+0x35/0x120 [ 2704.471942] ? iov_iter_revert+0xaa0/0xaa0 [ 2704.476169] ? lock_downgrade+0x910/0x910 [ 2704.480344] ? kasan_check_read+0x11/0x20 [ 2704.484941] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2704.490208] ? rcu_read_unlock_special+0x380/0x380 [ 2704.495131] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2704.500135] ? iov_iter_pipe+0xba/0x2f0 [ 2704.504104] default_file_splice_read+0x1b1/0xac0 [ 2704.508938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.514466] ? aa_path_link+0x5d0/0x5d0 [ 2704.518432] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2704.523696] ? iter_file_splice_write+0xfc0/0xfc0 [ 2704.528523] ? add_lock_to_list.isra.0+0x450/0x450 [ 2704.533442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.538967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.544509] ? check_preemption_disabled+0x48/0x290 [ 2704.549535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.555061] ? fsnotify+0x4f5/0xed0 [ 2704.558676] ? debug_mutex_init+0x2d/0x60 [ 2704.562814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.568347] ? __fsnotify_parent+0xe2/0x450 [ 2704.572661] ? fsnotify_first_mark+0x350/0x350 [ 2704.577239] ? apparmor_path_rmdir+0x30/0x30 [ 2704.581651] ? alloc_pipe_info+0x286/0x580 [ 2704.585888] ? security_file_permission+0x94/0x320 [ 2704.590814] ? rw_verify_area+0x118/0x360 [ 2704.594963] ? iter_file_splice_write+0xfc0/0xfc0 [ 2704.599852] do_splice_to+0x12a/0x190 [ 2704.603648] splice_direct_to_actor+0x31b/0x9d0 [ 2704.608312] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2704.613154] ? do_splice_to+0x190/0x190 [ 2704.617129] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.622664] ? rw_verify_area+0x118/0x360 [ 2704.626802] do_splice_direct+0x2c7/0x420 [ 2704.630950] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2704.635786] ? rcu_read_lock_sched_held+0x110/0x130 [ 2704.640794] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2704.645555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2704.651079] ? __sb_start_write+0x1ac/0x360 [ 2704.655393] do_sendfile+0x61a/0xe60 [ 2704.659107] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2704.663681] ? fput+0x128/0x1a0 [ 2704.666963] ? do_syscall_64+0x8c/0x800 [ 2704.670940] ? do_syscall_64+0x8c/0x800 [ 2704.674909] __x64_sys_sendfile64+0x1f8/0x240 [ 2704.679400] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2704.683971] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2704.688724] do_syscall_64+0x1a3/0x800 [ 2704.692610] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2704.697529] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2704.702540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2704.707382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2704.712555] RIP: 0033:0x458089 [ 2704.715735] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2704.734623] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2704.742317] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2704.749572] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2704.756838] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 05:17:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='Xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2704.764097] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2704.771356] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 05:17:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005490f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:02 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd001, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:02 executing program 1 (fault-call:2 fault-nth:7): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) [ 2704.957922] XFS (loop3): Mounting V4 Filesystem [ 2704.972075] XFS (loop3): totally zeroed log [ 2705.009455] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006490f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:02 executing program 5: 05:17:02 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='cfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2705.113799] FAULT_INJECTION: forcing a failure. [ 2705.113799] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2705.145585] CPU: 0 PID: 25794 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2705.152783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2705.162116] Call Trace: [ 2705.162138] dump_stack+0x1db/0x2d0 [ 2705.162157] ? dump_stack_print_info.cold+0x20/0x20 [ 2705.168352] ? kernel_text_address+0x73/0xf0 [ 2705.177737] should_fail.cold+0xa/0x15 [ 2705.181630] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2705.186731] ? arch_local_save_flags+0x50/0x50 [ 2705.186744] ? lock_release+0xc40/0xc40 [ 2705.186756] ? __lock_is_held+0xb6/0x140 [ 2705.186778] should_fail_alloc_page+0x50/0x60 [ 2705.199335] __alloc_pages_nodemask+0x323/0xdc0 [ 2705.199347] ? add_lock_to_list.isra.0+0x450/0x450 05:17:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007490f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2705.199365] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2705.199388] ? __kmalloc_node+0x3d/0x70 [ 2705.199408] ? rcu_read_lock_sched_held+0x110/0x130 [ 2705.227429] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2705.232968] alloc_pages_current+0x107/0x210 [ 2705.237377] push_pipe+0x3fc/0x7a0 [ 2705.240920] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 2705.245851] ? aa_file_perm+0x42e/0x1090 [ 2705.249911] ? find_held_lock+0x35/0x120 [ 2705.254008] ? iov_iter_revert+0xaa0/0xaa0 [ 2705.258244] ? lock_downgrade+0x910/0x910 [ 2705.262386] ? kasan_check_read+0x11/0x20 [ 2705.266537] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2705.271826] ? rcu_read_unlock_special+0x380/0x380 [ 2705.276762] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2705.276775] ? iov_iter_pipe+0xba/0x2f0 [ 2705.276792] default_file_splice_read+0x1b1/0xac0 [ 2705.276806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.285767] ? aa_path_link+0x5d0/0x5d0 [ 2705.285782] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2705.285795] ? iter_file_splice_write+0xfc0/0xfc0 [ 2705.285806] ? add_lock_to_list.isra.0+0x450/0x450 [ 2705.285824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.320636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.326163] ? check_preemption_disabled+0x48/0x290 [ 2705.331192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.336725] ? fsnotify+0x4f5/0xed0 [ 2705.340359] ? debug_mutex_init+0x2d/0x60 [ 2705.344494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.350013] ? __fsnotify_parent+0xe2/0x450 [ 2705.354317] ? fsnotify_first_mark+0x350/0x350 [ 2705.358891] ? apparmor_path_rmdir+0x30/0x30 [ 2705.363288] ? alloc_pipe_info+0x286/0x580 [ 2705.367513] ? security_file_permission+0x94/0x320 [ 2705.372423] ? rw_verify_area+0x118/0x360 [ 2705.376546] ? iter_file_splice_write+0xfc0/0xfc0 [ 2705.381367] do_splice_to+0x12a/0x190 [ 2705.385154] splice_direct_to_actor+0x31b/0x9d0 [ 2705.389810] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2705.394638] ? do_splice_to+0x190/0x190 [ 2705.398592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.404127] ? rw_verify_area+0x118/0x360 [ 2705.408265] do_splice_direct+0x2c7/0x420 [ 2705.412408] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2705.417232] ? rcu_read_lock_sched_held+0x110/0x130 [ 2705.422223] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2705.426953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.432466] ? __sb_start_write+0x1ac/0x360 [ 2705.436777] do_sendfile+0x61a/0xe60 [ 2705.440497] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2705.445059] ? fput+0x128/0x1a0 [ 2705.448318] ? do_syscall_64+0x8c/0x800 [ 2705.452272] ? do_syscall_64+0x8c/0x800 [ 2705.456236] __x64_sys_sendfile64+0x1f8/0x240 [ 2705.460709] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2705.465270] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2705.470015] do_syscall_64+0x1a3/0x800 [ 2705.473892] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2705.478799] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2705.483807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2705.488641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2705.493842] RIP: 0033:0x458089 [ 2705.497018] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2705.501464] net_ratelimit: 16 callbacks suppressed [ 2705.501470] protocol 88fb is buggy, dev hsr_slave_0 [ 2705.515914] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2705.515927] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2705.515934] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2705.515942] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2705.515950] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 05:17:02 executing program 1 (fault-call:2 fault-nth:8): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) 05:17:02 executing program 5: 05:17:03 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd100, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2705.515958] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 [ 2705.520953] protocol 88fb is buggy, dev hsr_slave_1 [ 2705.533729] protocol 88fb is buggy, dev hsr_slave_0 [ 2705.570075] protocol 88fb is buggy, dev hsr_slave_1 [ 2705.580197] protocol 88fb is buggy, dev hsr_slave_0 [ 2705.590250] protocol 88fb is buggy, dev hsr_slave_1 [ 2705.740108] FAULT_INJECTION: forcing a failure. [ 2705.740108] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2705.763757] CPU: 1 PID: 25818 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2705.770951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2705.780287] Call Trace: [ 2705.782867] dump_stack+0x1db/0x2d0 [ 2705.786489] ? dump_stack_print_info.cold+0x20/0x20 [ 2705.791607] ? kernel_text_address+0x73/0xf0 [ 2705.796012] should_fail.cold+0xa/0x15 [ 2705.799895] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2705.804995] ? arch_local_save_flags+0x50/0x50 [ 2705.809581] ? lock_release+0xc40/0xc40 [ 2705.813550] ? __lock_is_held+0xb6/0x140 [ 2705.817627] should_fail_alloc_page+0x50/0x60 [ 2705.822111] __alloc_pages_nodemask+0x323/0xdc0 [ 2705.826768] ? add_lock_to_list.isra.0+0x450/0x450 [ 2705.831688] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2705.836705] ? __kmalloc_node+0x3d/0x70 [ 2705.840675] ? rcu_read_lock_sched_held+0x110/0x130 [ 2705.845710] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2705.851249] alloc_pages_current+0x107/0x210 [ 2705.855651] push_pipe+0x3fc/0x7a0 [ 2705.859191] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 2705.864107] ? aa_file_perm+0x42e/0x1090 [ 2705.868171] ? find_held_lock+0x35/0x120 [ 2705.872228] ? iov_iter_revert+0xaa0/0xaa0 [ 2705.876472] ? lock_downgrade+0x910/0x910 [ 2705.880612] ? kasan_check_read+0x11/0x20 [ 2705.884752] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2705.890021] ? rcu_read_unlock_special+0x380/0x380 [ 2705.894945] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2705.899948] ? iov_iter_pipe+0xba/0x2f0 [ 2705.903927] default_file_splice_read+0x1b1/0xac0 [ 2705.908759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.914284] ? aa_path_link+0x5d0/0x5d0 [ 2705.918250] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2705.923515] ? iter_file_splice_write+0xfc0/0xfc0 [ 2705.928347] ? add_lock_to_list.isra.0+0x450/0x450 [ 2705.933268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.938803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.944337] ? check_preemption_disabled+0x48/0x290 [ 2705.949348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.954887] ? fsnotify+0x4f5/0xed0 [ 2705.958511] ? debug_mutex_init+0x2d/0x60 [ 2705.962654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2705.968200] ? __fsnotify_parent+0xe2/0x450 [ 2705.972514] ? fsnotify_first_mark+0x350/0x350 [ 2705.977089] ? apparmor_path_rmdir+0x30/0x30 [ 2705.981490] ? alloc_pipe_info+0x286/0x580 [ 2705.985725] ? security_file_permission+0x94/0x320 [ 2705.990654] ? rw_verify_area+0x118/0x360 [ 2705.994794] ? iter_file_splice_write+0xfc0/0xfc0 [ 2705.999640] do_splice_to+0x12a/0x190 [ 2706.003432] splice_direct_to_actor+0x31b/0x9d0 [ 2706.008105] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2706.012943] ? do_splice_to+0x190/0x190 [ 2706.016905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.022434] ? rw_verify_area+0x118/0x360 [ 2706.026573] do_splice_direct+0x2c7/0x420 [ 2706.030720] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2706.035574] ? rcu_read_lock_sched_held+0x110/0x130 [ 2706.040601] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2706.045346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.050871] ? __sb_start_write+0x1ac/0x360 [ 2706.055184] do_sendfile+0x61a/0xe60 [ 2706.058899] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2706.063473] ? fput+0x128/0x1a0 [ 2706.066741] ? do_syscall_64+0x8c/0x800 [ 2706.070705] ? do_syscall_64+0x8c/0x800 [ 2706.074673] __x64_sys_sendfile64+0x1f8/0x240 [ 2706.079158] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2706.083733] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2706.088521] do_syscall_64+0x1a3/0x800 [ 2706.092402] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2706.097323] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2706.102332] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2706.107192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2706.112380] RIP: 0033:0x458089 [ 2706.115559] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2706.134448] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2706.142142] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2706.149418] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2706.156685] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2706.163937] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2706.171194] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 [ 2706.187190] protocol 88fb is buggy, dev hsr_slave_0 05:17:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000004a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:03 executing program 5: [ 2706.192296] protocol 88fb is buggy, dev hsr_slave_1 [ 2706.197432] protocol 88fb is buggy, dev hsr_slave_0 [ 2706.202504] protocol 88fb is buggy, dev hsr_slave_1 05:17:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:03 executing program 5: 05:17:03 executing program 1 (fault-call:2 fault-nth:9): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) 05:17:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000014a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:03 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='dfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:03 executing program 5: [ 2706.437940] FAULT_INJECTION: forcing a failure. [ 2706.437940] name fail_page_alloc, interval 1, probability 0, space 0, times 0 05:17:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000024a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:03 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd101, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2706.563382] CPU: 0 PID: 25846 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2706.570578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2706.579928] Call Trace: [ 2706.582514] dump_stack+0x1db/0x2d0 [ 2706.586143] ? dump_stack_print_info.cold+0x20/0x20 [ 2706.591165] ? kernel_text_address+0x73/0xf0 [ 2706.595575] should_fail.cold+0xa/0x15 [ 2706.599457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2706.604557] ? arch_local_save_flags+0x50/0x50 [ 2706.609129] ? lock_release+0xc40/0xc40 [ 2706.613099] ? __lock_is_held+0xb6/0x140 [ 2706.617161] should_fail_alloc_page+0x50/0x60 [ 2706.621664] __alloc_pages_nodemask+0x323/0xdc0 [ 2706.626333] ? add_lock_to_list.isra.0+0x450/0x450 [ 2706.631259] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2706.636279] ? __kmalloc_node+0x3d/0x70 [ 2706.640245] ? rcu_read_lock_sched_held+0x110/0x130 [ 2706.645250] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2706.650791] alloc_pages_current+0x107/0x210 [ 2706.655194] push_pipe+0x3fc/0x7a0 [ 2706.658733] iov_iter_get_pages_alloc+0x90f/0x15a0 [ 2706.663649] ? aa_file_perm+0x42e/0x1090 [ 2706.667699] ? find_held_lock+0x35/0x120 [ 2706.671753] ? iov_iter_revert+0xaa0/0xaa0 [ 2706.675982] ? lock_downgrade+0x910/0x910 [ 2706.680155] ? kasan_check_read+0x11/0x20 [ 2706.684324] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2706.689605] ? rcu_read_unlock_special+0x380/0x380 [ 2706.694526] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2706.699530] ? iov_iter_pipe+0xba/0x2f0 [ 2706.703501] default_file_splice_read+0x1b1/0xac0 [ 2706.708330] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.713869] ? aa_path_link+0x5d0/0x5d0 [ 2706.717842] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2706.723113] ? iter_file_splice_write+0xfc0/0xfc0 [ 2706.727942] ? add_lock_to_list.isra.0+0x450/0x450 [ 2706.732862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.738388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.743934] ? check_preemption_disabled+0x48/0x290 [ 2706.748950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.754478] ? fsnotify+0x4f5/0xed0 [ 2706.758102] ? debug_mutex_init+0x2d/0x60 [ 2706.762242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.767767] ? __fsnotify_parent+0xe2/0x450 [ 2706.772082] ? fsnotify_first_mark+0x350/0x350 [ 2706.776664] ? apparmor_path_rmdir+0x30/0x30 [ 2706.781080] ? alloc_pipe_info+0x286/0x580 [ 2706.785322] ? security_file_permission+0x94/0x320 [ 2706.790246] ? rw_verify_area+0x118/0x360 [ 2706.794383] ? iter_file_splice_write+0xfc0/0xfc0 [ 2706.799217] do_splice_to+0x12a/0x190 [ 2706.803024] splice_direct_to_actor+0x31b/0x9d0 [ 2706.807682] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2706.812519] ? do_splice_to+0x190/0x190 [ 2706.816483] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.822013] ? rw_verify_area+0x118/0x360 [ 2706.826167] do_splice_direct+0x2c7/0x420 [ 2706.830327] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2706.835164] ? rcu_read_lock_sched_held+0x110/0x130 [ 2706.840167] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2706.844913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.850435] ? __sb_start_write+0x1ac/0x360 [ 2706.854749] do_sendfile+0x61a/0xe60 [ 2706.858463] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2706.863039] ? fput+0x128/0x1a0 [ 2706.866309] ? do_syscall_64+0x8c/0x800 [ 2706.870274] ? do_syscall_64+0x8c/0x800 [ 2706.874261] __x64_sys_sendfile64+0x1f8/0x240 [ 2706.878747] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2706.883332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2706.888085] do_syscall_64+0x1a3/0x800 [ 2706.891982] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2706.896902] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2706.901911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2706.906783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2706.911959] RIP: 0033:0x458089 [ 2706.915142] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2706.934033] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2706.941726] RAX: ffffffffffffffda RBX: 00007f2539cbec90 RCX: 0000000000458089 [ 2706.948980] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2706.956235] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 05:17:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='ifs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2706.963492] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2706.970747] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 0000000000000005 05:17:04 executing program 5: 05:17:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000034a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:04 executing program 5: [ 2707.166861] XFS (loop3): Mounting V4 Filesystem [ 2707.196185] XFS (loop3): totally zeroed log [ 2707.201560] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000044a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:04 executing program 1 (fault-call:2 fault-nth:10): r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) 05:17:04 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd200, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:04 executing program 5: 05:17:04 executing program 5: 05:17:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000054a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:04 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='lfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000064a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:04 executing program 5: 05:17:05 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd201, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='ofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:05 executing program 5: 05:17:05 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000002) 05:17:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000074a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2707.783872] XFS (loop3): Mounting V4 Filesystem [ 2707.835795] XFS (loop3): totally zeroed log [ 2707.859619] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:05 executing program 5: 05:17:05 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd300, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000004b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='pfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:05 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000003) 05:17:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000014b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000080)="ff8033a26e6206db99dd647b47bb", 0xe, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/255, 0xff}], 0x1}}], 0x1, 0x0, 0x0) 05:17:05 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='sfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:05 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000007) 05:17:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000024b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:05 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) setpriority(0x0, 0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) arch_prctl$ARCH_GET_FS(0x1003, 0x0) arch_prctl$ARCH_GET_FS(0x1003, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0x2, &(0x7f0000001540), 0x0) getegid() [ 2708.463515] mmap: syz-executor5 (26017): VmData 18546688 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 2708.497594] XFS (loop3): Mounting V4 Filesystem [ 2708.551553] XFS (loop3): totally zeroed log [ 2708.556624] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:06 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd301, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:06 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000000a) 05:17:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000034b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='ufs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r0, 0x0, 0x31, &(0x7f00000001c0)={@multicast2, @local}, 0x10) 05:17:06 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000010) 05:17:06 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) 05:17:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='\xf4fs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000044b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:06 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(r1, &(0x7f0000000680)=[{&(0x7f00000001c0)=""/255, 0xff}, {0x0}, {0x0}], 0x3, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x6, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x7000, 0x891, &(0x7f0000ff7000/0x7000)=nil) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x10010009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000400)={0xa0}, 0x4) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000003c0)) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7ff, 0x0, 0x5, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd23, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x81, 0x92d, 0x1b0, 0x7, 0x4, 0x4, 0x0, 0x0, 0x0, 0x1, 0xd26c, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000001}, 0x1, 0x0, 0x5, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0xfffffffffffffffd, 0x811, r3, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 05:17:06 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000633) [ 2709.105682] XFS (loop3): Mounting V4 Filesystem [ 2709.142764] XFS (loop3): totally zeroed log [ 2709.159490] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000054b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:06 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd400, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:06 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000653) 05:17:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='x\ns\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:06 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(r1, &(0x7f0000000680)=[{&(0x7f00000001c0)=""/255, 0xff}, {0x0}, {0x0}], 0x3, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x6, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x7000, 0x891, &(0x7f0000ff7000/0x7000)=nil) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x10010009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000400)={0xa0}, 0x4) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000003c0)) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7ff, 0x0, 0x5, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd23, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x81, 0x92d, 0x1b0, 0x7, 0x4, 0x4, 0x0, 0x0, 0x0, 0x1, 0xd26c, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000001}, 0x1, 0x0, 0x5, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0xfffffffffffffffd, 0x811, r3, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 05:17:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000064b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:06 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000660) 05:17:06 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000074b0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:07 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000671) 05:17:07 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd401, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2709.829560] XFS (loop3): Mounting V4 Filesystem [ 2709.883772] XFS (loop3): totally zeroed log [ 2709.895467] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:07 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000691) 05:17:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000004c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:07 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd500, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:07 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(r1, &(0x7f0000000680)=[{&(0x7f00000001c0)=""/255, 0xff}, {0x0}, {0x0}], 0x3, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x6, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x7000, 0x891, &(0x7f0000ff7000/0x7000)=nil) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000080)={0x10010009, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000400)={0xa0}, 0x4) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f00000003c0)) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x7ff, 0x0, 0x5, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd23, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x81, 0x92d, 0x1b0, 0x7, 0x4, 0x4, 0x0, 0x0, 0x0, 0x1, 0xd26c, 0x0, 0x0, 0x8, 0xffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000001}, 0x1, 0x0, 0x5, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0xfffffffffffffffd, 0x811, r3, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 05:17:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000014c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:07 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000069e) 05:17:07 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000024c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:07 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd501, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:07 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800006b0) [ 2710.574770] XFS (loop3): Mounting V4 Filesystem [ 2710.612503] XFS (loop3): totally zeroed log [ 2710.622772] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:08 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800006d0) 05:17:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000034c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:08 executing program 5: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800006b0) 05:17:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xes\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:08 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd600, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:08 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800006dd) 05:17:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000044c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='x\xf4s\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:08 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd601, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000054c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2711.068860] net_ratelimit: 24 callbacks suppressed [ 2711.068867] protocol 88fb is buggy, dev hsr_slave_0 [ 2711.079456] protocol 88fb is buggy, dev hsr_slave_1 [ 2711.335486] XFS (loop3): Mounting V4 Filesystem [ 2711.351559] XFS (loop5): Mounting V4 Filesystem [ 2711.399810] XFS (loop3): totally zeroed log [ 2711.410802] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2711.418309] XFS (loop5): totally zeroed log [ 2711.427548] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:17:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:08 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800006f0) 05:17:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000064c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:08 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf\n\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:08 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd700, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:09 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000710) 05:17:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000074c0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2711.793715] protocol 88fb is buggy, dev hsr_slave_0 [ 2711.798848] protocol 88fb is buggy, dev hsr_slave_1 [ 2711.804040] protocol 88fb is buggy, dev hsr_slave_0 [ 2711.809105] protocol 88fb is buggy, dev hsr_slave_1 05:17:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:09 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd701, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000004d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:09 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000071d) [ 2711.874397] protocol 88fb is buggy, dev hsr_slave_0 [ 2711.879460] protocol 88fb is buggy, dev hsr_slave_1 [ 2712.054585] XFS (loop3): Mounting V4 Filesystem [ 2712.138369] XFS (loop3): totally zeroed log [ 2712.172963] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2712.196467] XFS (loop5): Mounting V4 Filesystem [ 2712.226275] XFS (loop5): totally zeroed log [ 2712.233372] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:17:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:09 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd800, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000014d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:09 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000072f) 05:17:09 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) [ 2712.439057] protocol 88fb is buggy, dev hsr_slave_0 [ 2712.444186] protocol 88fb is buggy, dev hsr_slave_1 05:17:09 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000074f) 05:17:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000024d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:10 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd801, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:10 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000075c) 05:17:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000034d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2712.925175] XFS (loop5): Mounting V4 Filesystem [ 2712.987356] XFS (loop3): Mounting V4 Filesystem [ 2713.006356] XFS (loop5): totally zeroed log [ 2713.013545] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2713.042359] XFS (loop3): totally zeroed log [ 2713.051532] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:10 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000076f) 05:17:10 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd900, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000044d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:10 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000078f) 05:17:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000054d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:10 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:10 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xd901, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:10 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000079c) [ 2713.547191] XFS (loop3): Mounting V4 Filesystem 05:17:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000064d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2713.636754] XFS (loop3): totally zeroed log [ 2713.674643] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2713.766511] XFS (loop5): Mounting V4 Filesystem [ 2713.799908] XFS (loop5): totally zeroed log [ 2713.807646] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:17:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:11 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800007af) 05:17:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000074d0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:11 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xda00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000004e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:11 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800007cf) 05:17:11 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xda01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:11 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800007dc) 05:17:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000014e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2714.423240] XFS (loop3): Mounting V4 Filesystem [ 2714.448226] XFS (loop3): totally zeroed log [ 2714.477861] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2714.516292] XFS (loop5): Mounting V4 Filesystem [ 2714.546272] XFS (loop5): totally zeroed log [ 2714.563080] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:17:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000024e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:11 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800007f0) 05:17:11 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xdb00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:11 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:12 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000810) 05:17:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000034e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:12 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000081d) 05:17:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000044e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:12 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xdb01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:12 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:12 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000830) 05:17:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000054e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2715.218416] XFS (loop3): Mounting V4 Filesystem [ 2715.266337] XFS (loop3): totally zeroed log [ 2715.281004] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2715.309947] XFS (loop5): Mounting V4 Filesystem [ 2715.359922] XFS (loop5): totally zeroed log [ 2715.386706] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:17:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:12 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000850) 05:17:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000064e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:13 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xdc00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:13 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000085d) 05:17:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000074e0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:13 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000871) 05:17:13 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xdc01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000004f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2716.049663] XFS (loop3): Mounting V4 Filesystem [ 2716.133987] XFS (loop3): totally zeroed log [ 2716.147649] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2716.328882] XFS (loop5): Mounting V4 Filesystem [ 2716.358951] XFS (loop5): totally zeroed log [ 2716.379022] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:17:13 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xdd00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:13 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000891) 05:17:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000014f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:13 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:14 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000089e) [ 2716.633934] net_ratelimit: 22 callbacks suppressed [ 2716.633940] protocol 88fb is buggy, dev hsr_slave_0 [ 2716.644027] protocol 88fb is buggy, dev hsr_slave_1 [ 2716.649154] protocol 88fb is buggy, dev hsr_slave_0 [ 2716.654284] protocol 88fb is buggy, dev hsr_slave_1 05:17:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000024f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2716.721306] XFS (loop3): Mounting V4 Filesystem [ 2716.795058] XFS (loop3): totally zeroed log [ 2716.818585] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:14 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800008b1) 05:17:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2716.991909] XFS (loop5): Mounting V4 Filesystem 05:17:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000034f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:14 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xdd01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:14 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800008d1) [ 2717.054571] XFS (loop5): totally zeroed log [ 2717.083625] XFS (loop5): Failed to read root inode 0x100000000080, error 22 05:17:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000044f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000300), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)=0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:14 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800008de) 05:17:14 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xde00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:14 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xf\xf4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000054f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:14 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800008f2) [ 2717.359935] protocol 88fb is buggy, dev hsr_slave_0 [ 2717.365017] protocol 88fb is buggy, dev hsr_slave_1 [ 2717.520321] XFS (loop3): Mounting V4 Filesystem [ 2717.566013] XFS (loop3): totally zeroed log 05:17:14 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000912) [ 2717.602394] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2717.782917] XFS (loop5): Mounting V4 Filesystem 05:17:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000064f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:15 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xde01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:15 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000091f) [ 2717.850380] XFS (loop5): totally zeroed log [ 2717.866119] XFS (loop5): Failed to read root inode 0x100000000080, error 22 [ 2718.085970] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.091049] protocol 88fb is buggy, dev hsr_slave_1 [ 2718.096239] protocol 88fb is buggy, dev hsr_slave_0 [ 2718.101318] protocol 88fb is buggy, dev hsr_slave_1 05:17:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000074f0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:15 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000932) 05:17:15 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:15 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xdf00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000500f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:15 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2718.382581] FAULT_INJECTION: forcing a failure. [ 2718.382581] name failslab, interval 1, probability 0, space 0, times 0 [ 2718.409056] XFS (loop3): Mounting V4 Filesystem [ 2718.448062] CPU: 1 PID: 27008 Comm: syz-executor5 Not tainted 5.0.0-rc4+ #50 [ 2718.455283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2718.464643] Call Trace: [ 2718.467252] dump_stack+0x1db/0x2d0 [ 2718.470914] ? dump_stack_print_info.cold+0x20/0x20 [ 2718.475967] should_fail.cold+0xa/0x15 [ 2718.475989] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2718.476015] ? ___might_sleep+0x1e7/0x310 [ 2718.485000] ? arch_local_save_flags+0x50/0x50 [ 2718.485031] __should_failslab+0x121/0x190 [ 2718.485052] should_failslab+0x9/0x14 [ 2718.493770] __kmalloc+0x2dc/0x740 [ 2718.493787] ? strncpy_from_user+0x4e0/0x4e0 [ 2718.493806] ? fput+0x128/0x1a0 [ 2718.493826] ? do_syscall_64+0x8c/0x800 [ 2718.501884] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 2718.501905] __x64_sys_memfd_create+0x13c/0x4b0 [ 2718.501923] ? memfd_fcntl+0x1870/0x1870 [ 2718.501940] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2718.501964] do_syscall_64+0x1a3/0x800 [ 2718.535476] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2718.535509] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2718.535531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2718.544354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2718.544368] RIP: 0033:0x458089 [ 2718.544384] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2718.544393] RSP: 002b:00007f0d34625a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2718.544412] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458089 [ 2718.596559] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004bd087 [ 2718.603854] RBP: 000000000073bf00 R08: 0000000020000098 R09: 00000000fbad8001 [ 2718.611135] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f0d346266d4 [ 2718.618409] R13: 00000000004c69a2 R14: 00000000004dbdd0 R15: 0000000000000003 [ 2718.626453] XFS (loop3): totally zeroed log [ 2718.666603] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001500f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:16 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000952) 05:17:16 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xdf01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x05', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:16 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002500f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:16 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x8000095f) 05:17:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x06', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003500f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:16 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000973) 05:17:16 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe000, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:16 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\a', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2719.357547] FAULT_INJECTION: forcing a failure. [ 2719.357547] name failslab, interval 1, probability 0, space 0, times 0 [ 2719.428862] XFS (loop3): Mounting V4 Filesystem 05:17:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004500f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2719.456789] CPU: 0 PID: 27045 Comm: syz-executor5 Not tainted 5.0.0-rc4+ #50 [ 2719.464025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2719.473389] Call Trace: [ 2719.476001] dump_stack+0x1db/0x2d0 [ 2719.479663] ? dump_stack_print_info.cold+0x20/0x20 [ 2719.484902] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2719.490236] ? print_usage_bug+0xd0/0xd0 [ 2719.494322] should_fail.cold+0xa/0x15 [ 2719.498250] ? fault_create_debugfs_attr+0x1e0/0x1e0 05:17:16 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000993) [ 2719.503393] ? ___might_sleep+0x1e7/0x310 [ 2719.507566] ? arch_local_save_flags+0x50/0x50 [ 2719.512188] __should_failslab+0x121/0x190 [ 2719.516446] should_failslab+0x9/0x14 [ 2719.520283] kmem_cache_alloc+0x2be/0x710 [ 2719.524451] ? shmem_destroy_callback+0xc0/0xc0 [ 2719.529158] shmem_alloc_inode+0x1c/0x50 [ 2719.533237] alloc_inode+0x66/0x190 [ 2719.536891] new_inode_pseudo+0x71/0x1b0 [ 2719.540972] ? prune_icache_sb+0x1c0/0x1c0 [ 2719.545227] ? _raw_spin_unlock+0x2d/0x50 [ 2719.549402] new_inode+0x1f/0x40 [ 2719.552787] shmem_get_inode+0xe1/0x8d0 [ 2719.556782] ? shmem_encode_fh+0x340/0x340 [ 2719.561041] ? lock_downgrade+0x910/0x910 [ 2719.565210] ? lock_release+0xc40/0xc40 [ 2719.569201] ? __check_object_size+0xa3/0x790 [ 2719.573722] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2719.573745] shmem_file_setup+0x66/0x90 [ 2719.573763] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2719.587246] ? memfd_fcntl+0x1870/0x1870 [ 2719.591347] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2719.596151] do_syscall_64+0x1a3/0x800 [ 2719.600060] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2719.605018] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2719.610057] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2719.614938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2719.620154] RIP: 0033:0x458089 [ 2719.623356] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2719.642258] RSP: 002b:00007f0d34625a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2719.642273] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458089 [ 2719.642283] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004bd087 [ 2719.642292] RBP: 000000000073bf00 R08: 0000000020000098 R09: 00000000fbad8001 [ 2719.642302] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f0d346266d4 [ 2719.642311] R13: 00000000004c69a2 R14: 00000000004dbdd0 R15: 0000000000000003 [ 2719.712894] XFS (loop3): totally zeroed log [ 2719.761298] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005500f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:17 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:17 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800009a0) 05:17:17 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe001, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2719.975192] FAULT_INJECTION: forcing a failure. [ 2719.975192] name failslab, interval 1, probability 0, space 0, times 0 [ 2720.006320] CPU: 0 PID: 27111 Comm: syz-executor5 Not tainted 5.0.0-rc4+ #50 [ 2720.013539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2720.022898] Call Trace: [ 2720.022925] dump_stack+0x1db/0x2d0 [ 2720.022949] ? dump_stack_print_info.cold+0x20/0x20 [ 2720.022967] ? new_inode_pseudo+0x71/0x1b0 [ 2720.022981] ? new_inode+0x1f/0x40 [ 2720.023003] ? shmem_get_inode+0xe1/0x8d0 [ 2720.029218] ? __shmem_file_setup.part.0+0x7e/0x2b0 [ 2720.029233] ? shmem_file_setup+0x66/0x90 [ 2720.029253] ? do_syscall_64+0x1a3/0x800 [ 2720.029276] should_fail.cold+0xa/0x15 [ 2720.063287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2720.068412] ? ___might_sleep+0x1e7/0x310 [ 2720.072575] ? arch_local_save_flags+0x50/0x50 [ 2720.077189] ? lockdep_init_map+0x10c/0x5b0 [ 2720.081538] __should_failslab+0x121/0x190 [ 2720.085794] should_failslab+0x9/0x14 [ 2720.085812] kmem_cache_alloc+0x2be/0x710 [ 2720.085830] ? kasan_check_read+0x11/0x20 [ 2720.093815] __d_alloc+0xae/0xbe0 [ 2720.093858] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 2720.093877] ? _raw_spin_unlock+0x2d/0x50 [ 2720.093892] ? inode_sb_list_add+0x223/0x310 [ 2720.093911] ? current_time+0x104/0x1b0 [ 2720.093927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.093944] ? lockdep_init_map+0x10c/0x5b0 [ 2720.093969] d_alloc_pseudo+0x1e/0x30 [ 2720.101585] alloc_file_pseudo+0x14f/0x3b0 [ 2720.101606] ? alloc_file+0x4d0/0x4d0 [ 2720.101624] ? __check_object_size+0xa3/0x790 [ 2720.101644] ? kasan_check_write+0x14/0x20 [ 2720.101665] __shmem_file_setup.part.0+0x108/0x2b0 [ 2720.110826] shmem_file_setup+0x66/0x90 [ 2720.110865] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2720.110882] ? memfd_fcntl+0x1870/0x1870 [ 2720.110900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2720.110924] do_syscall_64+0x1a3/0x800 [ 2720.141006] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2720.141027] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2720.141054] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2720.149796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2720.149809] RIP: 0033:0x458089 [ 2720.149826] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2720.149854] RSP: 002b:00007f0d34625a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 05:17:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\t', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:17 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) [ 2720.149872] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458089 [ 2720.233164] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004bd087 [ 2720.240444] RBP: 000000000073bf00 R08: 0000000020000098 R09: 00000000fbad8001 [ 2720.247722] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f0d346266d4 [ 2720.254999] R13: 00000000004c69a2 R14: 00000000004dbdd0 R15: 0000000000000003 05:17:17 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800009b5) 05:17:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006500f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:17 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe100, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:17 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\n', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2720.405863] FAULT_INJECTION: forcing a failure. [ 2720.405863] name failslab, interval 1, probability 0, space 0, times 0 [ 2720.442714] CPU: 0 PID: 27131 Comm: syz-executor5 Not tainted 5.0.0-rc4+ #50 [ 2720.449931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2720.459298] Call Trace: [ 2720.461894] dump_stack+0x1db/0x2d0 [ 2720.465519] ? dump_stack_print_info.cold+0x20/0x20 [ 2720.470550] ? percpu_ref_put_many+0x129/0x270 [ 2720.475162] should_fail.cold+0xa/0x15 [ 2720.479062] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2720.484207] ? ___might_sleep+0x1e7/0x310 [ 2720.488388] ? arch_local_save_flags+0x50/0x50 [ 2720.493001] __should_failslab+0x121/0x190 [ 2720.497254] should_failslab+0x9/0x14 [ 2720.501076] kmem_cache_alloc+0x2be/0x710 05:17:17 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800009d5) [ 2720.505245] ? d_instantiate+0x7b/0xa0 [ 2720.509145] ? find_held_lock+0x35/0x120 [ 2720.513235] __alloc_file+0x93/0x480 [ 2720.516973] ? file_free_rcu+0xe0/0xe0 [ 2720.520917] ? kasan_check_read+0x11/0x20 [ 2720.525088] ? do_raw_spin_unlock+0xa0/0x330 [ 2720.529537] ? do_raw_spin_trylock+0x270/0x270 [ 2720.534141] alloc_empty_file+0x72/0x170 [ 2720.538225] alloc_file+0x5e/0x4d0 [ 2720.541790] alloc_file_pseudo+0x24a/0x3b0 [ 2720.546055] ? alloc_file+0x4d0/0x4d0 [ 2720.549885] ? __check_object_size+0xa3/0x790 [ 2720.554375] ? kasan_check_write+0x14/0x20 [ 2720.558611] __shmem_file_setup.part.0+0x108/0x2b0 [ 2720.563563] shmem_file_setup+0x66/0x90 [ 2720.567546] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2720.572207] ? memfd_fcntl+0x1870/0x1870 [ 2720.576273] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2720.581055] do_syscall_64+0x1a3/0x800 [ 2720.584952] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2720.589882] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2720.594910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2720.599767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2720.604950] RIP: 0033:0x458089 [ 2720.608135] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2720.627029] RSP: 002b:00007f0d34625a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2720.634728] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458089 [ 2720.641988] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004bd087 [ 2720.649248] RBP: 000000000073bf00 R08: 0000000020000098 R09: 00000000fbad8001 [ 2720.656535] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f0d346266d4 [ 2720.663807] R13: 00000000004c69a2 R14: 00000000004dbdd0 R15: 0000000000000003 [ 2720.974743] XFS (loop3): Mounting V4 Filesystem [ 2721.021073] XFS (loop3): totally zeroed log [ 2721.046153] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007500f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:18 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\r', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:18 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800009e2) 05:17:18 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe101, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2721.192446] FAULT_INJECTION: forcing a failure. [ 2721.192446] name failslab, interval 1, probability 0, space 0, times 0 [ 2721.248913] CPU: 1 PID: 27173 Comm: syz-executor5 Not tainted 5.0.0-rc4+ #50 [ 2721.256130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2721.265533] Call Trace: [ 2721.268157] dump_stack+0x1db/0x2d0 [ 2721.271807] ? dump_stack_print_info.cold+0x20/0x20 [ 2721.276893] should_fail.cold+0xa/0x15 [ 2721.280808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2721.285961] ? ___might_sleep+0x1e7/0x310 [ 2721.290128] ? arch_local_save_flags+0x50/0x50 [ 2721.294758] __should_failslab+0x121/0x190 [ 2721.299103] should_failslab+0x9/0x14 [ 2721.302941] kmem_cache_alloc_trace+0x2d1/0x760 [ 2721.307640] ? __might_sleep+0x95/0x190 [ 2721.311645] apparmor_file_alloc_security+0x172/0xad0 [ 2721.311662] ? rcu_pm_notify+0xd0/0xd0 [ 2721.311683] ? apparmor_path_rename+0xcb0/0xcb0 [ 2721.325429] ? __alloc_file+0x93/0x480 [ 2721.325443] ? __alloc_file+0x93/0x480 [ 2721.325458] ? rcu_read_lock_sched_held+0x110/0x130 [ 2721.325472] ? kmem_cache_alloc+0x341/0x710 [ 2721.325494] security_file_alloc+0x69/0xb0 [ 2721.325525] __alloc_file+0x128/0x480 [ 2721.350891] ? file_free_rcu+0xe0/0xe0 [ 2721.354803] ? kasan_check_read+0x11/0x20 [ 2721.359002] ? do_raw_spin_unlock+0xa0/0x330 [ 2721.363444] ? do_raw_spin_trylock+0x270/0x270 [ 2721.368048] alloc_empty_file+0x72/0x170 [ 2721.372137] alloc_file+0x5e/0x4d0 [ 2721.375698] alloc_file_pseudo+0x24a/0x3b0 [ 2721.379961] ? alloc_file+0x4d0/0x4d0 [ 2721.383785] ? __check_object_size+0xa3/0x790 [ 2721.388301] ? kasan_check_write+0x14/0x20 [ 2721.392562] __shmem_file_setup.part.0+0x108/0x2b0 05:17:18 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x800009f8) 05:17:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000510f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001510f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2721.397537] shmem_file_setup+0x66/0x90 [ 2721.401554] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2721.406242] ? memfd_fcntl+0x1870/0x1870 [ 2721.410318] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2721.415100] do_syscall_64+0x1a3/0x800 [ 2721.419015] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2721.423967] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2721.423991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2721.424016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2721.424029] RIP: 0033:0x458089 [ 2721.424045] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2721.424054] RSP: 002b:00007f0d34625a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2721.424069] RAX: ffffffffffffffda RBX: 0000000020000080 RCX: 0000000000458089 [ 2721.424079] RDX: 0000000020000098 RSI: 0000000000000000 RDI: 00000000004bd087 [ 2721.424088] RBP: 000000000073bf00 R08: 0000000020000098 R09: 00000000fbad8001 05:17:18 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) [ 2721.424109] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007f0d346266d4 [ 2721.433996] R13: 00000000004c69a2 R14: 00000000004dbdd0 R15: 0000000000000003 05:17:18 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x0e', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:18 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe200, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2721.719558] FAULT_INJECTION: forcing a failure. [ 2721.719558] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2721.803668] CPU: 0 PID: 27213 Comm: syz-executor5 Not tainted 5.0.0-rc4+ #50 [ 2721.810885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2721.810892] Call Trace: [ 2721.810915] dump_stack+0x1db/0x2d0 [ 2721.810936] ? dump_stack_print_info.cold+0x20/0x20 [ 2721.831551] ? print_usage_bug+0xd0/0xd0 [ 2721.835635] should_fail.cold+0xa/0x15 [ 2721.839543] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2721.844666] ? arch_local_save_flags+0x50/0x50 [ 2721.844680] ? lock_release+0xc40/0xc40 [ 2721.844694] ? __lock_is_held+0xb6/0x140 [ 2721.844723] should_fail_alloc_page+0x50/0x60 [ 2721.861816] __alloc_pages_nodemask+0x323/0xdc0 [ 2721.866521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2721.872083] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 2721.877126] ? kasan_check_read+0x11/0x20 [ 2721.877159] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2721.877181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2721.877198] ? xas_load+0x67/0x150 [ 2721.886617] ? mpol_shared_policy_lookup+0xf7/0x150 [ 2721.886638] ? shmem_pseudo_vma_init+0x18d/0x2a0 [ 2721.905489] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2721.911044] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2721.916604] alloc_pages_vma+0xdd/0x540 [ 2721.920603] shmem_alloc_page+0xc0/0x1b0 [ 2721.920620] ? shmem_swapin+0x230/0x230 [ 2721.920662] ? cap_capable+0x205/0x270 [ 2721.920692] shmem_alloc_and_acct_page+0x218/0xd90 [ 2721.932598] ? shmem_getattr+0x2c0/0x2c0 [ 2721.941606] ? mark_held_locks+0x100/0x100 [ 2721.945879] ? print_usage_bug+0xd0/0xd0 [ 2721.949960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2721.955547] ? __lock_acquire+0x572/0x4a30 [ 2721.959799] ? print_usage_bug+0xd0/0xd0 [ 2721.963901] shmem_getpage_gfp+0x68d/0x4b70 [ 2721.968262] ? shmem_add_to_page_cache+0x19d0/0x19d0 [ 2721.973378] ? __lock_acquire+0x572/0x4a30 [ 2721.973394] ? mark_held_locks+0x100/0x100 [ 2721.973408] ? lock_downgrade+0x910/0x910 [ 2721.973422] ? kasan_check_read+0x11/0x20 [ 2721.973442] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2721.981929] ? mark_held_locks+0x100/0x100 [ 2721.981945] ? print_usage_bug+0xd0/0xd0 [ 2721.981963] ? is_bpf_text_address+0xd3/0x170 [ 2721.981982] ? add_lock_to_list.isra.0+0x450/0x450 [ 2721.982000] ? print_usage_bug+0xd0/0xd0 [ 2721.982018] ? __lock_acquire+0x572/0x4a30 [ 2721.982036] ? simple_xattr_get+0x109/0x180 [ 2721.982053] ? add_lock_to_list.isra.0+0x450/0x450 [ 2721.982070] ? simple_xattr_get+0x109/0x180 [ 2721.982090] ? print_usage_bug+0xd0/0xd0 [ 2722.039342] ? lock_acquire+0x1db/0x570 [ 2722.043327] ? current_time+0x6e/0x1b0 [ 2722.047221] ? find_held_lock+0x35/0x120 [ 2722.051290] ? mark_held_locks+0xb1/0x100 [ 2722.055449] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 2722.060650] ? ktime_get_coarse_real_ts64+0x15a/0x3b0 [ 2722.065867] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2722.070464] ? trace_hardirqs_on+0xbd/0x310 [ 2722.074798] ? current_time+0x6e/0x1b0 [ 2722.078695] ? trace_hardirqs_off_caller+0x300/0x300 [ 2722.083817] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2722.088873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2722.094425] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2722.099636] shmem_write_begin+0x105/0x1e0 [ 2722.103912] generic_perform_write+0x2a0/0x6b0 [ 2722.108536] ? add_page_wait_queue+0x480/0x480 [ 2722.113131] ? current_time+0x1b0/0x1b0 [ 2722.117137] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2722.122191] ? generic_write_check_limits+0x291/0x380 [ 2722.127400] __generic_file_write_iter+0x25e/0x630 [ 2722.132339] ? rcu_read_unlock_special+0x380/0x380 [ 2722.137282] generic_file_write_iter+0x34e/0x6a0 [ 2722.142054] ? __generic_file_write_iter+0x630/0x630 [ 2722.147183] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2722.152734] ? iov_iter_init+0xea/0x220 [ 2722.156724] __vfs_write+0x764/0xb40 [ 2722.160453] ? kernel_read+0x120/0x120 [ 2722.164369] ? rcu_read_lock_sched_held+0x110/0x130 [ 2722.169394] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2722.174174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2722.179717] ? __sb_start_write+0x1ac/0x360 [ 2722.184057] vfs_write+0x20c/0x580 [ 2722.187618] ksys_pwrite64+0x183/0x1c0 [ 2722.191536] ? __ia32_sys_pread64+0xf0/0xf0 [ 2722.195879] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2722.201427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2722.206816] ? trace_hardirqs_off_caller+0x300/0x300 [ 2722.211957] __x64_sys_pwrite64+0x97/0xf0 [ 2722.216126] do_syscall_64+0x1a3/0x800 [ 2722.220027] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2722.224970] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2722.230007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2722.234884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2722.240084] RIP: 0033:0x412097 [ 2722.243293] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2722.262198] RSP: 002b:00007f0d34625a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2722.269914] RAX: ffffffffffffffda RBX: 0000000020000090 RCX: 0000000000412097 [ 2722.277192] RDX: 000000000000007b RSI: 0000000020010000 RDI: 0000000000000004 [ 2722.280771] net_ratelimit: 20 callbacks suppressed [ 2722.280779] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.284464] RBP: 0000000000000000 R08: 0000000020000098 R09: 00000000fbad8001 [ 2722.284504] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 2722.289643] protocol 88fb is buggy, dev hsr_slave_1 [ 2722.294583] R13: 0000000000000001 R14: 00000000004dbdd0 R15: 0000000000000003 [ 2722.321751] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.326871] protocol 88fb is buggy, dev hsr_slave_1 [ 2722.361396] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.366480] protocol 88fb is buggy, dev hsr_slave_1 05:17:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002510f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:19 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000a18) 05:17:19 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe201, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:19 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x10', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:19 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000a25) 05:17:19 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003510f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:19 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000a3a) 05:17:20 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe300, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x1a', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2722.913501] XFS (loop5): SB sanity check failed [ 2722.919049] XFS (loop5): Metadata corruption detected at xfs_sb_read_verify+0x4b1/0x600, xfs_sb block 0xffffffffffffffff [ 2722.936230] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.941366] protocol 88fb is buggy, dev hsr_slave_1 [ 2722.946597] protocol 88fb is buggy, dev hsr_slave_0 [ 2722.952036] protocol 88fb is buggy, dev hsr_slave_1 05:17:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004510f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2723.000206] XFS (loop5): Unmount and run xfs_repair [ 2723.063728] XFS (loop5): First 128 bytes of corrupted metadata buffer: [ 2723.107723] 00000000: 58 46 53 42 00 00 10 00 00 00 00 00 00 00 10 00 XFSB............ [ 2723.171562] 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ [ 2723.188043] 00000020: 98 4f 0b 50 42 b6 4b 06 bc 86 cb a3 e6 cc 3f 80 .O.PB.K.......?. [ 2723.228392] 00000030: 00 00 00 00 00 00 00 40 00 00 10 00 00 00 00 80 .......@........ [ 2723.237192] 00000040: 00 00 00 00 00 00 00 81 00 00 00 00 00 00 00 82 ................ [ 2723.253241] 00000050: 00 00 00 01 00 00 10 00 00 00 00 01 00 00 00 00 ................ [ 2723.261816] 00000060: 00 00 06 c0 b4 a4 02 00 01 00 00 10 00 00 00 00 ................ [ 2723.300384] XFS (loop3): Mounting V4 Filesystem [ 2723.304150] 00000070: 00 00 00 00 00 00 00 00 0c 09 08 00 00 00 00 00 ................ [ 2723.318031] XFS (loop5): SB validate failed with error -117. [ 2723.336259] XFS (loop3): totally zeroed log [ 2723.354963] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:20 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000a5a) 05:17:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005510f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:20 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe301, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:20 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\"', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='\nfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:20 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='%fs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:20 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000a67) 05:17:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006510f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs#', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='Xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007510f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2723.977210] XFS (loop3): Mounting V4 Filesystem [ 2723.983908] XFS (loop3): totally zeroed log [ 2723.993619] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:21 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000a7d) 05:17:21 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe400, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs&', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000520f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='cfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001520f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:21 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000a9d) 05:17:21 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='dfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:21 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfsP', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:21 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe401, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002520f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2724.531148] XFS (loop3): Mounting V4 Filesystem [ 2724.568333] XFS (loop3): totally zeroed log [ 2724.581684] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:22 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000aaa) 05:17:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs`', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003520f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='ifs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:22 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe500, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:22 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000abb) 05:17:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004520f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:22 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000adb) 05:17:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005520f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:22 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe501, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfsz', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2725.265393] XFS (loop3): Mounting V4 Filesystem [ 2725.289907] XFS (loop3): totally zeroed log [ 2725.304817] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) semop(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='lfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:22 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000ae8) 05:17:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs|', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006520f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:22 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe600, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:22 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000af9) 05:17:22 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs~', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007520f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:22 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='ofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:22 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000b19) 05:17:23 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe601, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2725.841268] XFS (loop3): Mounting V4 Filesystem [ 2725.848148] XFS (loop3): totally zeroed log [ 2725.854757] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:23 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000b26) 05:17:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000530f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='pfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:23 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe700, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x94', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:23 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000b37) 05:17:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001530f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:23 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xb8', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:23 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='sfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:23 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe701, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:23 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000b57) [ 2726.603392] XFS (loop3): Mounting V4 Filesystem [ 2726.640775] XFS (loop3): totally zeroed log [ 2726.660270] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002530f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:24 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000b64) 05:17:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xc4', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:24 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe800, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='ufs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003530f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:24 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000b75) 05:17:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004530f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:24 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe801, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:24 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000b95) 05:17:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xce', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2727.344323] XFS (loop3): Mounting V4 Filesystem [ 2727.369712] XFS (loop3): totally zeroed log [ 2727.377929] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semget(0x0, 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005530f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:24 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='}fs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:24 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000ba2) 05:17:24 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe900, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xd0', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:24 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000bb3) 05:17:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006530f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='\xf4fs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) [ 2727.846953] net_ratelimit: 24 callbacks suppressed [ 2727.846959] protocol 88fb is buggy, dev hsr_slave_0 [ 2727.857002] protocol 88fb is buggy, dev hsr_slave_1 05:17:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xd2', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:25 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000bd3) 05:17:25 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xe901, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2727.967625] XFS (loop3): Mounting V4 Filesystem [ 2727.976371] XFS (loop3): totally zeroed log [ 2727.987164] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007530f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:25 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000be0) 05:17:25 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xea00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:25 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000bf1) 05:17:25 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf2', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='x\ns\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000540f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:25 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000c11) 05:17:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001540f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:25 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xea01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2728.572954] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.578045] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.583178] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.588247] protocol 88fb is buggy, dev hsr_slave_1 05:17:25 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='x%s\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) [ 2728.654703] protocol 88fb is buggy, dev hsr_slave_0 [ 2728.660562] protocol 88fb is buggy, dev hsr_slave_1 [ 2728.904317] XFS (loop3): Mounting V4 Filesystem [ 2728.935819] XFS (loop3): totally zeroed log [ 2728.971461] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002540f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf3', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:26 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000c1e) 05:17:26 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xeb00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='x.s\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003540f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:26 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000c2f) [ 2729.218329] protocol 88fb is buggy, dev hsr_slave_0 [ 2729.223461] protocol 88fb is buggy, dev hsr_slave_1 05:17:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf4', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:26 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000c4f) 05:17:26 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='x/s\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:26 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xeb01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004540f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2729.577792] XFS (loop3): Mounting V4 Filesystem 05:17:26 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000c5c) 05:17:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005540f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2729.680287] XFS (loop3): totally zeroed log 05:17:26 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf6', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2729.715547] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:27 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000c6d) 05:17:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006540f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:27 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xec00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xes\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:27 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000c8d) 05:17:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007540f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xfc', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:27 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xec01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:27 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000c9a) 05:17:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000550f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:27 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000cab) [ 2730.455145] XFS (loop3): Mounting V4 Filesystem [ 2730.492415] XFS (loop3): totally zeroed log [ 2730.508830] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:27 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xed00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:27 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='x}s\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001550f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:27 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000ccb) 05:17:27 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x1a', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:27 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000cd8) 05:17:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002550f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='x\xf4s\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:28 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000ce9) 05:17:28 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xed01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs ', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2731.057984] XFS (loop3): Mounting V4 Filesystem [ 2731.115220] XFS (loop3): totally zeroed log [ 2731.125096] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs0', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003550f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:28 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000d09) 05:17:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:28 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xee00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:28 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000d16) 05:17:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004550f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf\n\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:28 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000d27) 05:17:28 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xee01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:28 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs:', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005550f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:28 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf#\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) [ 2731.624811] XFS (loop3): Mounting V4 Filesystem [ 2731.635806] XFS (loop3): totally zeroed log 05:17:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006550f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:28 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000d47) [ 2731.667410] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:29 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000d54) 05:17:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf%\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007550f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:29 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xef00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfsd', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf*\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:29 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000d65) [ 2732.038634] XFS (loop3): Mounting V4 Filesystem [ 2732.067204] XFS (loop3): totally zeroed log 05:17:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000560f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2732.099523] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf+\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:29 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000d85) 05:17:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x82', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:29 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xef01, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001560f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:29 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000d92) 05:17:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002560f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:29 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf-\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:29 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000da3) [ 2732.566133] XFS (loop3): Mounting V4 Filesystem [ 2732.580494] XFS (loop3): totally zeroed log [ 2732.585366] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:29 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf000, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003560f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:29 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000dc3) 05:17:29 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x8e', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004560f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:30 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf001, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:30 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000dd0) 05:17:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf.\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005560f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:30 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000de0) [ 2733.167638] XFS (loop3): Mounting V4 Filesystem 05:17:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006560f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:30 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000e00) [ 2733.282381] XFS (loop3): totally zeroed log [ 2733.299846] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2733.413138] net_ratelimit: 22 callbacks suppressed [ 2733.413145] protocol 88fb is buggy, dev hsr_slave_0 [ 2733.423205] protocol 88fb is buggy, dev hsr_slave_1 [ 2733.428304] protocol 88fb is buggy, dev hsr_slave_0 [ 2733.433394] protocol 88fb is buggy, dev hsr_slave_1 05:17:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x9a', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:30 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf100, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007560f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:30 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000e0d) 05:17:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf0\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:30 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000e1d) 05:17:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000570f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:30 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfX\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:30 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000e3d) 05:17:30 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xa0', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:30 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf101, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2733.881448] XFS (loop3): Mounting V4 Filesystem [ 2733.944821] XFS (loop3): totally zeroed log [ 2733.994332] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2734.139212] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.144262] protocol 88fb is buggy, dev hsr_slave_1 05:17:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') readahead(r0, 0xffffffff, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001570f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:31 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000e4a) 05:17:31 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfc\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:31 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf200, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xa6', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:31 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000e5a) 05:17:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002570f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:31 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf201, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:31 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xae', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003570f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:31 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000e7a) [ 2734.795105] XFS (loop3): Mounting V4 Filesystem [ 2734.843354] XFS (loop3): totally zeroed log [ 2734.865201] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.870271] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.875399] protocol 88fb is buggy, dev hsr_slave_0 [ 2734.880451] protocol 88fb is buggy, dev hsr_slave_1 [ 2734.892107] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:32 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf300, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfd\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004570f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:32 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000e87) 05:17:32 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xe4', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005570f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:32 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000e97) 05:17:32 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfi\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006570f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:32 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf301, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:32 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000eb7) 05:17:32 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf0', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007570f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:32 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000ec4) [ 2735.556892] XFS (loop3): Mounting V4 Filesystem [ 2735.640977] XFS (loop3): totally zeroed log 05:17:32 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf400, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2735.666774] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000580f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:33 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000ed4) 05:17:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfl\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:33 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf401, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xf2', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:33 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001580f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:33 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000ef4) 05:17:33 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000f01) 05:17:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002580f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:33 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf500, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:33 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000f11) 05:17:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfo\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003580f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs ', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004580f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:33 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000f31) [ 2736.433194] XFS (loop3): Mounting V4 Filesystem [ 2736.462053] XFS (loop3): totally zeroed log [ 2736.467221] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:33 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) chroot(&(0x7f0000000200)='./file0\x00') ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:33 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf501, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005580f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:33 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000f3e) 05:17:33 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfp\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:33 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs.', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:33 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000f4e) 05:17:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006580f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:34 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf600, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007580f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:34 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000f6e) 05:17:34 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf601, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 2737.401207] XFS (loop3): Mounting V4 Filesystem [ 2737.449565] XFS (loop3): totally zeroed log [ 2737.479232] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:34 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000f7b) 05:17:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000590f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:34 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs<', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfu\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:34 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf700, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001590f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:34 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000f8b) 05:17:34 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfx\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:34 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf701, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002590f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:35 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000fab) [ 2738.109284] XFS (loop3): Mounting V4 Filesystem [ 2738.128101] XFS (loop3): totally zeroed log [ 2738.133686] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf}\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfsD', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:35 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf800, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003590f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:35 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x80000fb8) 05:17:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004590f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:35 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f0000000000)='ne\xff/igmp\x00') sendfile(r0, r2, 0x0, 0x80000002) 05:17:35 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf801, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:35 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x80', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:35 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xf\xf4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005590f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x80000002) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x69, 0xf83, 0x9, 0xc25f, 0x81, 0x7}) [ 2738.650886] XFS (loop3): Mounting V4 Filesystem 05:17:35 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r2, 0x0, 0x80000002) 05:17:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006590f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2738.724708] XFS (loop3): totally zeroed log [ 2738.739894] XFS (loop3): Failed to read root inode 0x100000000080, error 22 05:17:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) readahead(r0, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:36 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf900, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007590f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:36 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendfile(r0, r1, 0x0, 0x1000000080000002) 05:17:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x02', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) 05:17:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xa6', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) [ 2739.059997] net_ratelimit: 20 callbacks suppressed [ 2739.060004] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.070060] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.075149] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.080244] protocol 88fb is buggy, dev hsr_slave_1 05:17:36 executing program 1: r0 = memfd_create(&(0x7f0000000100)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') r2 = getpid() fcntl$setown(r1, 0x8, r2) sendfile(r0, r1, 0x0, 0x80000002) 05:17:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000005a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 2739.140669] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.145781] protocol 88fb is buggy, dev hsr_slave_1 05:17:36 executing program 1: r0 = memfd_create(&(0x7f0000000000)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\xdf\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='eo0userD\xaa\x19\xbf\x93\x94\x8dw\xbd\x10\x89,\x92A)\xae\xcd\x10\x81z\xe0C\x95&m\xc3\x16X\x04\xff=7\x99\x9d\x88\xd9sR\xffg\xd2\xeb\"\x01kn\xb3\x04\xa6O\xc6:\xc5-\xe4\x8d\x00', r2) sendfile(r0, r1, 0x0, 0x80000002) 05:17:36 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xf901, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000015a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:36 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x03', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) [ 2739.488873] XFS (loop3): Mounting V4 Filesystem [ 2739.549562] XFS (loop3): totally zeroed log [ 2739.567870] XFS (loop3): Failed to read root inode 0x100000000080, error 22 [ 2739.705400] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.710526] protocol 88fb is buggy, dev hsr_slave_1 [ 2739.715698] protocol 88fb is buggy, dev hsr_slave_0 [ 2739.720752] protocol 88fb is buggy, dev hsr_slave_1 05:17:36 executing program 3: chroot(&(0x7f0000000200)='./file0\x00') readahead(0xffffffffffffffff, 0xffffffff, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semop(0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000440)=0x8) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}}, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x84, &(0x7f0000000240), &(0x7f0000000180)=0x4) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7, 0x0, 0x0, 0x5}) 05:17:36 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\'bEev\x00', 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='personality\x00') ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000000)={0xfffffffffffff180, "bddeabc81b865fc58e9edaff49b701e70d0fc961b365604e455b210a1ac989aa", 0x2, 0x4, 0x1, 0x424e, 0x4, 0x1, 0x3, 0x6}) sendfile(r0, r1, 0x0, 0x80000002) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x3, 0x0, [], [{0x1, 0x101, 0x0, 0x80000000, 0xab18, 0x6}, {0x8, 0x4, 0xd3, 0x1, 0xe3a, 0x1}], [[], [], []]}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0xc5, "74477d52d7a4a8785d76af085bc5a6840beee9f58608a21cca4c263ed37df8a0390c24b1411901d50d709ea712bdc78d763f2e7ee2c8e7f1ebd7e28bc95ae0771b7bc3206a9a6c8f4af32742ea8ebef6e3d887ac234a0c20767a2454d564c8ab680840b0d614b0c5d87f1fcd66d6cf41e0621c7b529ff8e83ed20a334d86780b1699f371490ad95dbcdbdb58a8dd5ad8192f279dd35cc605b05c48bd420e07dee05aac1911d36288deed8a9967be2a5e1f192d8b482a30425e2a0d6a076b62fa00b4a7018d"}, &(0x7f0000000100)=0xcd) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r2, 0xc1, 0x0, 0x1}, &(0x7f0000000180)=0x10) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x1, 0x0) 05:17:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000025a0f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 05:17:36 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\xb0', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c09", 0x7a}], 0x0, 0x0) 05:17:36 executing program 0: getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000040)={0x0, 0xfa00, &(0x7f0000c00000/0x400000)=nil}) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:17:37 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x04', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80000000000000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908", 0x7b}], 0x0, 0x0) [ 2739.898342] [ 2739.899980] ====================================================== [ 2739.906281] WARNING: possible circular locking dependency detected [ 2739.912587] 5.0.0-rc4+ #50 Not tainted [ 2739.916473] ------------------------------------------------------ [ 2739.922782] syz-executor1/29092 is trying to acquire lock: [ 2739.925451] kobject: 'kvm' (000000000b0942a3): kobject_uevent_env [ 2739.928389] 000000003f62af1f (&sig->cred_guard_mutex){+.+.}, at: lock_trace+0x4a/0xe0 [ 2739.928414] [ 2739.928414] but task is already holding lock: [ 2739.928418] 00000000a79e06bb (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 2739.928433] [ 2739.928433] which lock already depends on the new lock. [ 2739.928433] [ 2739.928439] [ 2739.928439] the existing dependency chain (in reverse order) is: [ 2739.935944] kobject: 'kvm' (000000000b0942a3): kobject_uevent_env [ 2739.942592] [ 2739.942592] -> #2 (&p->lock){+.+.}: [ 2739.942619] __mutex_lock+0x12f/0x1670 [ 2739.942628] mutex_lock_nested+0x16/0x20 [ 2739.942636] seq_read+0x71/0x1130 [ 2739.942648] proc_reg_read+0x29a/0x3c0 [ 2739.999796] do_iter_read+0x4a9/0x660 [ 2740.004115] vfs_readv+0x175/0x1c0 [ 2740.008159] default_file_splice_read+0x50c/0xac0 [ 2740.013514] do_splice_to+0x12a/0x190 [ 2740.017814] do_splice+0xff7/0x1410 [ 2740.021948] __x64_sys_splice+0x2c6/0x330 [ 2740.026610] do_syscall_64+0x1a3/0x800 [ 2740.031004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2740.036699] [ 2740.036699] -> #1 (&pipe->mutex/1){+.+.}: [ 2740.042312] __mutex_lock+0x12f/0x1670 [ 2740.046702] mutex_lock_nested+0x16/0x20 [ 2740.051267] fifo_open+0x159/0xb00 [ 2740.055307] do_dentry_open+0x48a/0x1210 [ 2740.059874] vfs_open+0xa0/0xd0 [ 2740.063660] path_openat+0x144f/0x5650 [ 2740.068061] do_filp_open+0x26f/0x370 [ 2740.072364] do_open_execat+0x20e/0x930 [ 2740.076846] __do_execve_file.isra.0+0x1966/0x2700 [ 2740.082279] __x64_sys_execve+0x8f/0xc0 [ 2740.086768] do_syscall_64+0x1a3/0x800 [ 2740.091161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2740.096853] [ 2740.096853] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 2740.103162] lock_acquire+0x1db/0x570 [ 2740.107465] __mutex_lock+0x12f/0x1670 [ 2740.111889] mutex_lock_killable_nested+0x16/0x20 [ 2740.117234] lock_trace+0x4a/0xe0 [ 2740.121190] proc_pid_personality+0x1c/0xd0 [ 2740.126029] proc_single_show+0xf6/0x180 [ 2740.130609] seq_read+0x4db/0x1130 [ 2740.134651] do_iter_read+0x4a9/0x660 [ 2740.138954] vfs_readv+0x175/0x1c0 [ 2740.142997] default_file_splice_read+0x50c/0xac0 [ 2740.148358] do_splice_to+0x12a/0x190 [ 2740.152664] splice_direct_to_actor+0x31b/0x9d0 [ 2740.157835] do_splice_direct+0x2c7/0x420 [ 2740.162507] do_sendfile+0x61a/0xe60 [ 2740.166724] __x64_sys_sendfile64+0x1f8/0x240 [ 2740.171720] do_syscall_64+0x1a3/0x800 [ 2740.176122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2740.181808] [ 2740.181808] other info that might help us debug this: [ 2740.181808] [ 2740.189938] Chain exists of: [ 2740.189938] &sig->cred_guard_mutex --> &pipe->mutex/1 --> &p->lock [ 2740.189938] [ 2740.200754] Possible unsafe locking scenario: [ 2740.200754] [ 2740.206785] CPU0 CPU1 [ 2740.211436] ---- ---- [ 2740.216078] lock(&p->lock); [ 2740.219160] lock(&pipe->mutex/1); [ 2740.225310] lock(&p->lock); [ 2740.230941] lock(&sig->cred_guard_mutex); [ 2740.235241] [ 2740.235241] *** DEADLOCK *** [ 2740.235241] [ 2740.241292] 2 locks held by syz-executor1/29092: [ 2740.246035] #0: 00000000cae822cb (sb_writers#13){.+.+}, at: do_sendfile+0xad7/0xe60 [ 2740.253924] #1: 00000000a79e06bb (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 2740.261098] [ 2740.261098] stack backtrace: [ 2740.265587] CPU: 1 PID: 29092 Comm: syz-executor1 Not tainted 5.0.0-rc4+ #50 [ 2740.272755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2740.282087] Call Trace: [ 2740.284661] dump_stack+0x1db/0x2d0 [ 2740.288273] ? dump_stack_print_info.cold+0x20/0x20 [ 2740.293276] ? print_stack_trace+0x77/0xb0 [ 2740.297499] ? vprintk_func+0x86/0x189 [ 2740.301378] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 2740.306771] __lock_acquire+0x3014/0x4a30 [ 2740.310909] ? mark_held_locks+0x100/0x100 [ 2740.315131] ? add_lock_to_list.isra.0+0x450/0x450 [ 2740.320044] ? is_bpf_text_address+0xac/0x170 [ 2740.324523] ? is_bpf_text_address+0xac/0x170 [ 2740.329004] ? add_lock_to_list.isra.0+0x450/0x450 [ 2740.333920] ? is_bpf_text_address+0xac/0x170 [ 2740.338398] ? print_usage_bug+0xd0/0xd0 [ 2740.342444] ? __lock_is_held+0xb6/0x140 [ 2740.346491] lock_acquire+0x1db/0x570 [ 2740.350275] ? lock_trace+0x4a/0xe0 [ 2740.353890] ? ___might_sleep+0x1e7/0x310 [ 2740.358021] ? lock_release+0xc40/0xc40 [ 2740.361979] ? depot_save_stack+0x1de/0x460 [ 2740.366284] ? trace_hardirqs_off_caller+0x300/0x300 [ 2740.371371] ? do_raw_spin_trylock+0x270/0x270 [ 2740.375951] ? lock_trace+0x4a/0xe0 [ 2740.379574] ? lock_trace+0x4a/0xe0 [ 2740.383186] __mutex_lock+0x12f/0x1670 [ 2740.387056] ? lock_trace+0x4a/0xe0 [ 2740.390664] ? lock_trace+0x4a/0xe0 [ 2740.394281] ? save_stack+0xa9/0xd0 [ 2740.397893] ? mutex_trylock+0x2d0/0x2d0 [ 2740.401937] ? kasan_kmalloc+0x9/0x10 [ 2740.405719] ? __kmalloc_node+0x4e/0x70 [ 2740.409680] ? kvmalloc_node+0x68/0x100 [ 2740.413633] ? seq_read+0x832/0x1130 [ 2740.417328] ? do_iter_read+0x4a9/0x660 [ 2740.421287] ? vfs_readv+0x175/0x1c0 [ 2740.424982] ? default_file_splice_read+0x50c/0xac0 [ 2740.429977] ? do_splice_to+0x12a/0x190 [ 2740.433932] ? splice_direct_to_actor+0x31b/0x9d0 [ 2740.438759] ? do_splice_direct+0x2c7/0x420 [ 2740.443065] ? add_lock_to_list.isra.0+0x450/0x450 [ 2740.447982] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2740.453329] ? add_lock_to_list.isra.0+0x450/0x450 [ 2740.458239] ? add_lock_to_list.isra.0+0x450/0x450 [ 2740.463206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.468726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.474248] ? check_preemption_disabled+0x48/0x290 [ 2740.479251] ? get_pid_task+0xd4/0x190 [ 2740.483569] ? find_held_lock+0x35/0x120 [ 2740.487618] ? get_pid_task+0xd4/0x190 [ 2740.491488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.497009] ? lock_downgrade+0x910/0x910 [ 2740.501154] ? kasan_check_read+0x11/0x20 [ 2740.505300] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2740.510579] mutex_lock_killable_nested+0x16/0x20 [ 2740.515409] ? mutex_lock_killable_nested+0x16/0x20 [ 2740.520408] lock_trace+0x4a/0xe0 [ 2740.523854] proc_pid_personality+0x1c/0xd0 [ 2740.528173] proc_single_show+0xf6/0x180 [ 2740.532228] seq_read+0x4db/0x1130 [ 2740.535757] do_iter_read+0x4a9/0x660 [ 2740.539544] ? dup_iter+0x260/0x260 [ 2740.543171] vfs_readv+0x175/0x1c0 [ 2740.546700] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 2740.552051] ? iov_iter_revert+0xaa0/0xaa0 [ 2740.556272] ? lock_downgrade+0x910/0x910 [ 2740.560403] ? kasan_check_read+0x11/0x20 [ 2740.564536] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2740.569795] ? rcu_read_unlock_special+0x380/0x380 [ 2740.574710] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2740.579707] ? iov_iter_pipe+0xba/0x2f0 [ 2740.583666] default_file_splice_read+0x50c/0xac0 [ 2740.588493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.594020] ? iter_file_splice_write+0xfc0/0xfc0 [ 2740.598852] ? add_lock_to_list.isra.0+0x450/0x450 [ 2740.603765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.609295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.614817] ? check_preemption_disabled+0x48/0x290 [ 2740.619826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.625356] ? fsnotify+0x4f5/0xed0 [ 2740.628991] ? debug_mutex_init+0x2d/0x60 [ 2740.633141] ? security_file_permission+0x94/0x320 [ 2740.638054] ? rw_verify_area+0x118/0x360 [ 2740.642183] ? iter_file_splice_write+0xfc0/0xfc0 [ 2740.647006] do_splice_to+0x12a/0x190 [ 2740.650805] splice_direct_to_actor+0x31b/0x9d0 [ 2740.655459] ? generic_pipe_buf_nosteal+0x10/0x10 [ 2740.660286] ? do_splice_to+0x190/0x190 [ 2740.664241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.669760] ? rw_verify_area+0x118/0x360 [ 2740.673895] do_splice_direct+0x2c7/0x420 [ 2740.678025] ? splice_direct_to_actor+0x9d0/0x9d0 [ 2740.682858] ? rcu_read_lock_sched_held+0x110/0x130 [ 2740.687877] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 2740.692626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.698146] ? __sb_start_write+0x1ac/0x360 [ 2740.702452] do_sendfile+0x61a/0xe60 [ 2740.706153] ? do_compat_pwritev64+0x1c0/0x1c0 [ 2740.710724] ? do_syscall_64+0x8c/0x800 [ 2740.714687] ? do_syscall_64+0x8c/0x800 [ 2740.718665] __x64_sys_sendfile64+0x1f8/0x240 [ 2740.723146] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 2740.727715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2740.732456] do_syscall_64+0x1a3/0x800 [ 2740.736331] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2740.741246] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2740.746248] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2740.751090] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2740.756269] RIP: 0033:0x458089 [ 2740.759449] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2740.778330] RSP: 002b:00007f2539cbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 2740.786023] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000458089 [ 2740.793284] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 2740.800547] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2740.807808] R10: 0000000080000002 R11: 0000000000000246 R12: 00007f2539cbf6d4 [ 2740.815062] R13: 00000000004c4fd7 R14: 00000000004d8b90 R15: 00000000ffffffff [ 2740.829391] ------------[ cut here ]------------ [ 2740.834251] downgrading a read lock [ 2740.834322] WARNING: CPU: 1 PID: 29091 at kernel/locking/lockdep.c:3553 lock_downgrade+0x4d2/0x910 [ 2740.844293] kobject: 'kvm' (000000000b0942a3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2740.847003] Kernel panic - not syncing: panic_on_warn set ... [ 2740.847014] CPU: 1 PID: 29091 Comm: modprobe Not tainted 5.0.0-rc4+ #50 [ 2740.847019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2740.847022] Call Trace: [ 2740.847035] dump_stack+0x1db/0x2d0 [ 2740.847046] ? dump_stack_print_info.cold+0x20/0x20 [ 2740.847060] ? lock_downgrade+0x4d0/0x910 [ 2740.847073] panic+0x2cb/0x65c [ 2740.857474] kobject: 'kvm' (000000000b0942a3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2740.861929] ? add_taint.cold+0x16/0x16 [ 2740.861941] ? lock_downgrade+0x4d2/0x910 [ 2740.861952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2740.861967] ? __probe_kernel_read+0x1f4/0x250 [ 2740.889235] kobject: 'kvm' (000000000b0942a3): kobject_uevent_env [ 2740.893301] ? __warn.cold+0x5/0x48 [ 2740.893312] ? __warn+0xe8/0x1d0 [ 2740.893323] ? lock_downgrade+0x4d2/0x910 [ 2740.893335] __warn.cold+0x20/0x48 [ 2740.896645] kobject: 'kvm' (000000000b0942a3): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 2740.905500] ? lock_downgrade+0x4d2/0x910 [ 2740.905511] report_bug+0x263/0x2b0 [ 2740.905525] do_error_trap+0x11b/0x200 [ 2740.905536] do_invalid_op+0x37/0x50 [ 2740.905545] ? lock_downgrade+0x4d2/0x910 [ 2740.905558] invalid_op+0x14/0x20 [ 2740.976306] RIP: 0010:lock_downgrade+0x4d2/0x910 [ 2740.981045] Code: 00 00 00 fc ff df 41 c6 04 06 f8 e9 1f ff ff ff 48 c7 c7 40 aa 4b 88 4c 89 8d 58 ff ff ff 48 89 85 60 ff ff ff e8 7e 10 e7 ff <0f> 0b 48 8b 85 60 ff ff ff 4c 8d 5d d8 4c 89 f1 48 ba 00 00 00 00 [ 2740.999969] RSP: 0018:ffff888057f1fbb8 EFLAGS: 00010082 [ 2741.005323] RAX: 0000000000000000 RBX: 1ffff1100afe3f7d RCX: 0000000000000000 [ 2741.012573] RDX: 0000000000000000 RSI: ffffffff81685776 RDI: 0000000000000006 [ 2741.019853] RBP: ffff888057f1fc70 R08: ffff8880932e6040 R09: fffffbfff1333349 [ 2741.027116] R10: fffffbfff1333348 R11: ffffffff89999a43 R12: ffff8880932e6040 [ 2741.034369] R13: ffffffff8b56caa0 R14: ffff888057f1fc08 R15: 0000000000000001 [ 2741.041633] ? vprintk_func+0x86/0x189 [ 2741.045505] ? lock_downgrade+0x4d2/0x910 [ 2741.049649] ? __do_munmap+0xc5a/0xef0 [ 2741.053522] ? lock_set_class+0x820/0x820 [ 2741.057651] ? lock_acquire+0x1db/0x570 [ 2741.061612] ? __vm_munmap+0xfa/0x1f0 [ 2741.065394] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2741.070398] ? userfaultfd_unmap_prep+0x456/0x5e0 [ 2741.075226] downgrade_write+0x76/0x270 [ 2741.079198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2741.084716] ? up_read+0x2b0/0x2b0 [ 2741.088240] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2741.093271] ? vma_compute_subtree_gap+0x158/0x230 [ 2741.098201] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2741.103204] __do_munmap+0xc5a/0xef0 [ 2741.106907] __vm_munmap+0x139/0x1f0 [ 2741.110616] ? __do_munmap+0xef0/0xef0 [ 2741.114488] ? __ia32_sys_fallocate+0xf0/0xf0 [ 2741.118972] ? trace_hardirqs_off_caller+0x300/0x300 [ 2741.124061] __x64_sys_munmap+0x67/0x80 [ 2741.128022] do_syscall_64+0x1a3/0x800 [ 2741.131899] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2741.136810] ? lockdep_sys_exit+0x49/0x5c [ 2741.140952] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2741.145961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2741.150792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2741.155967] RIP: 0033:0x7ff5155eb417 [ 2741.159668] Code: f0 ff ff 73 01 c3 48 8d 0d 8a ad 20 00 31 d2 48 29 c2 89 11 48 83 c8 ff eb eb 90 90 90 90 90 90 90 90 90 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8d 0d 5d ad 20 00 31 d2 48 29 c2 89 [ 2741.178558] RSP: 002b:00007fff12698f98 EFLAGS: 00000203 ORIG_RAX: 000000000000000b [ 2741.186247] RAX: ffffffffffffffda RBX: 00007ff5157f61c8 RCX: 00007ff5155eb417 [ 2741.193503] RDX: 000000007fb7e300 RSI: 00000000000033ef RDI: 00007ff5157ee000 [ 2741.200756] RBP: 00007fff12699100 R08: 0000000000000001 R09: 0000000000000007 [ 2741.208008] R10: 00007ff5155e5a0b R11: 0000000000000203 R12: 0000000015926bf1 [ 2741.215262] R13: 000005be15926bf1 R14: 000005bd95dbc67a R15: 00007ff5157ec700 [ 2741.223607] Kernel Offset: disabled [ 2741.227235] Rebooting in 86400 seconds..